Implementation Security
Address:
Ruhr-University Bochum
Faculty of Computer Science
Implementation Security
Universitätsstr. 150
–D-44801 Bochum
Room: MB 3/167
Telephone: (+49)(0)234 / 32 – 27219
Office Hours: By arrangement
E-Mail: amir.moradi@rub.de 🔑 PGP
©RUB, Marquard
this webpage will not be updated. For more recent version please refer to ImpSec @ TU Darmstadt.
Vita
- Since 10/2023: W3 Professor for Implementation Security
Department of Computer Science, Technische Universität Darmstadt, Germany - 8/2022-10/2023: W2 Professor for Implementation Security
Faculty of Computer Science, Ruhr-Universität Bochum, Germany - 10/2021-8/2022: W2 Professor for IT-Security
Institute of Computer Science, University of Cologne, Germany - 4/2021-10/2021: Extraordinary Professor (Außerplanmäßiger Professor)
Faculty of Electrical Engineering and Information Sciences, Ruhr-Universität Bochum, Germany - 1/2020-10/2021: Academic Councilor (Akademischer Rat)
Security Engineering, Ruhr-Universität Bochum, Germany - 2016-2019: Academic Councilor (Akademischer Rat)
Embedded Security, Ruhr-Universität Bochum, Germany - 10/2015-4/2021: Faculty Member (Privatdozent)
Faculty of Electrical Engineering and Information Sciences, Ruhr-Universität Bochum, Germany - 2015: Habilitation in Embedded Security („Advances in Side-Channel Security„)
Ruhr-Universität Bochum, Germany - 2009-2016: post-doctoral researcher
Embedded Security, Ruhr-Universität Bochum, Germany - 2008: PhD in Computer Engineering
Sharif University of Technology, Tehran, Iran - 2007-2008: visiting PhD student
Embedded Security, Ruhr-Universität Bochum, Germany - 2004: MSc in Computer Engineering
Sharif University of Technology, Tehran, Iran - 2001: BSc in Computer Engineering
Shahid Beheshti University, Tehran, Iran
Research
Topics
- Implementation Security
- Side-Channel Analysis and Countermeasures
- Fault-Injection Attacks and Countermeasures
- Efficient Implementation of Cryptographic Primitives
- Applied Cryptography
Profiles
Awards/Honors
- Distinguished Paper Award at IEEE S&P 2023.
- Awarded by 100,000 € (1st place) in the 9th German IT Security Award 2022, announcement.
- Highest number of publications at CHES in one year for the entire history of CHES, with 10 publications at CHES 2021, announcement.
- Currently the 2nd prolific author of CHES.
- Highest number of publications at CHES 2022 with 8 papers, announcement.
- Distinguished Paper award at USENIX Security Symposium – USENIX 2020.
- Best paper award at Conference on Cryptographic Hardware and Embedded Systems – CHES 2019.
- Co-author of the Best Student-Paper Award at IEEE International Symposium on Hardware Oriented Security and Trust – HOST 2016.
- Best Paper Award at International Workshop on Constructive Side-Channel Analysis and Secure Design – COSADE 2015.
- Co-author of the Best Student-Paper Award at International Conference on Applied Cryptography and Network Security – ACNS 2014.
- Nominated for the best paper award at Design, Automation & Test in Europe Conference & Exhibition – DATE 2018.
- Nominated for the best paper award at Design, Automation & Test in Europe Conference & Exhibition – DATE 2017.
- Nominated for the best paper award at Workshop on Cryptographic Hardware and Embedded Systems – CHES 2015.
Program Committee Membership
- 55+ memberships including CHES, EUROCRYPT, ASIACRYPT, FSE, INDOCRYPT, DATE, CARDIS, COSADE, etc.
Editorial Board Membership
- PC co-chair of Smart Card Research and Advanced Application Conference (CARDIS 2014).
- PC co-chair of International Workshop on Lightweight Cryptography for Security & Privacy (LightSec 2015).
- PC co-chair of Cryptographic Hardware and Embedded Systems (CHES 2020).
- Steering Committee Member of CHES, since 2019.
- Steering Committee Member of CARDIS, since 2014.
- Chair of the CHES Test of Time Award Committee, 2022 & 2023.
- Associate Editor of International Journal of Applied Cryptography, 2011-2020 (IJACT).
- Associate Editor of IEEE Transactions on Emerging Topics in Computing, 2019-2021 (IEEE-TETC).
- Associate Editor of Journal of Cryptographic Engineering, 2019-2022 (JCEN).
Selected Talks
- Statistical Tools Flavor Side-Channel Collision Attacks, EUROCRYPT 2012, April 17, Cambridge, UK. (talk)
- Breaking the Bitstream Decryption of FPGAs, invited talk at ECRYPT II Summer School: Challenges in Security Engineering, 2012, September 5, Bochum, Germany.
- How Far Should Theory Be from Practice? Evaluation of a Countermeasure, CHES 2012, September 10, Leuven, Belgium.
- On the Simplicity of Converting Leakages from Multivariate to Univariate, CHES 2013, August 21, Santa Barbara, US.
- Altera vs. Xilinx which one keeps your design hidden? rump session CHES 2013, August 22, Santa Barbara, US.
- Side-Channel Countermeasures for Hardware: is There a Light at the End of the Tunnel? invited talk at Worcester Polytechnic Institute, 2013, September 11, Worcester, US.
- Evaluation of Side-Channel Leakages through Statistical Moments invited talk at Bosch GmbH, 2014, March 13, Stuttgart, Germany.
- Side-Channel Leakage through Static Power Should We Care about in Practice? invited talk at NXP Semiconductors, 2014, April 22, Hamburg, Germany (+ CHES 2014, September 26, Busan, South Korea).
- Early Propagation and Imbalanced Routing, How to Diminish in FPGAs, CHES 2014, September 26, Busan, South Korea.
- Physical Attacks, extracting the secrets from cryptographic devices, invited talk at Bauhaus-Universität Weimar, 2015, January 22, Weimar, Germany.
- Side-Channel Security Analysis of Ultra-Low-Power FRAM-based MCUs, COSADE 2015, April 14, Berlin, Germany.
- Hiding Higher-Order Leakages in Hardware invited talk at TI day, KU Leuven, Belgium.
- Leakage Assessment Methodology – a clear roadmap for side-channel evaluations, invited talk at Sharif University of Technology, 2015, August 29, Tehran, Iran.
- Improved Side-Channel Analysis Attacks on Xilinx Bitstream Encryption of 5, 6, and 7 Series, COSADE 2016, April 14, Graz, Austria.
- Masking as a Side-Channel Countermeasure in Hardware, invited tutorial at ISCISC 2016, September 6, Tehran, Iran.
- Moments-Correlating DPA, CCS 2016 Workshops (TIS), October 24, Vienna, Austria.
- Side-Channel Analysis Protection and Low-Latency in Action – case study of PRINCE and Midori, ASIACRYPT 2016, December 07, Hanio, Vietnam. (talk)
- Bit-Sliding: A Generic Technique for Bit-Serial Implementations of SPN-based Primitives, CHES 2017, September 28, Taipei, Taiwan. (talk)
- The First Thorough Side-Channel Hardware Trojan, ASIACRYPT 2017, December 05, Hong Kong, China. (talk) + at Theory of Implementation Security (TIS) Workshop 2018, January 09, Zurich, Switzerland
- Exploring the Effect of Device Aging on Static Power Analysis Attacks, CHES 2019, August 28, Atlanta, USA. (talk)
- How to Apply Threshold Implementation to any PUF Primitive, invited talk at Theory of Implementation Security (TIS) Workshop 2019, November 11, London, England
- Threshold Implementation and Leakage Assessment, invited talk at Qualcomm, December 14, 2020
- Tools for Verification and Automatic Generation of Secure Hardware Circuits, invited talk at National Institute for Standard and Technology, USA, March 10, 2021
- Verification and Automatic Generation of Masked Hardware Designs, invited talk at Worcester Polytechnic Institute, USA, November 10, 2021
- Hardware Masking. Past, Present, and the Future, invited talk at Microsoft, December 8, 2021
- Automated Generation of Masked Hardware, CHES 2022, September 19, Leuven, Belgium. (talk)
Current PhDs
Joint Supervision
- Maik Ender (with Christof Paar)
Finished PhDs
- Oliver Mischke, 2016 (jointly supervised with Tim Güneysu)
- Pascal Sasdrich, 2018 (jointly supervised with Tim Güneysu)
- Tobias Schneider, 2018 (jointly supervised with Tim Güneysu)
- Alexander Wild, 2018 (jointly supervised with Tim Güneysu)
- Bastian Richter, 2020
- Shahram Rasoolzadeh, 2020
- Thorben Moos, 2021
- Anita Aghaie, 2022
- David Knichel, 2023
- Aein Rezaei Shahmirzadi, 2023
Funded DFG Projects
- NaSCA- Nano-Scale Side-Channel Analysis: Physical Security for Next-Generation CMOS ICs (DFG 2016-2020)
- GreenSec- Security for Internet of Things with Low Energy and Low Power Consumption (DFG 2018-2021)
- SuCCESS- SymmetriC CiphEr design with inherent phySical Security (DFG 2019-2023)
- Aged but Fit- Long Lasting Security for Trusted Platforms (DFG 2020-2022)
- SAUBER – phySicAlly secUre reconfiguraBlE platfoRm (DFG 2020-2024)
- SecFShare – Secure Sharing of FPGAs in Clouds (DFG 2021-2024)
- SSIMA – Scalable Side-Channel Immune Micro-Architecture (DFG 2024-2026)
Funded EU Project(s)
- enCRYPTON – Twinning towards excellence for Privacy Enhancing Technologies leveraging Homomorphic Encryption (HORIZON-CSA 2022-2025)
Funded BMBF Projects
- VeriSec- Computer-Assisted Integration and Verification of Masking in Cryptographic Implementations (BMBF 2017-2020)
- SysKit- A Development Tool for Secure Communications in Industry 4.0 (BMBF 2017-2020)
- mINDFUL – Intrusion Detection in Industry 4.0 via Fusion of Physical Channels using Artificial Intelligence (BMBF 2020-2023)
- KOSEF – Cost-optimized and Effective Protection against Electromagnetic Fault Injection to Ensure Data and Operational Reliability in loT Systems. (BMBF 2022-2025)
- DevToSCA – Developer-Centric Tools for Side-Channel Analysis (BMBF 2022-2025)
- ProPair – Context-based Trust Initialization of Telemedicine Micro Devices (BMBF 2022-2025)
- PoMMES: Prevention of Micro-architectural Leakages in Masked Embedded Software
Jannik Zeitschner, Amir Moradi, IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2024, No. 3. - Automated Generation of Fault-Resistant Circuits
Nicolai Müller, Amir Moradi, IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2024, No. 3. - A Deep Analysis of two Glitch-Free Hardware Masking Schemes SESYM and LMDPL
Nicolai Müller, Daniel Lammers, Amir Moradi, IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2024, No. 3. - JustSTART: How to Find an RSA Authentication Bypass on Xilinx UltraScale(+) with Fuzzing
Maik Ender, Felix Hahn, Marc Fyrbiak, Amir Moradi, Christof Paar, IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2024, No. 2.
- A Thorough Evaluation of RAMBAM
Daniel Lammers, Amir Moradi, Nicolai Müller, Aein Rezaei Shahmirzadi, ACM SIGSAC Conference on Computer and Communications Security (CCS ’23). Association for Computing Machinery, 2023. - Automated Masking of FPGA-Mapped Designs
Nicolai Müller, Sergej Meschkov, Dennis Gnad, Mehdi Tahoori, Amir Moradi, Conference on Field-Programmable Logic and Applications, FPL 2023. - PROLEAD_SW – Probing-Based Software Leakage Detection for ARM Binaries
Jannik Zeitschner, Nicolai Müller, Amir Moradi, IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2023, No. 3. - Deep Learning Side-Channel Collision Attack
Marvin Staib, Amir Moradi, IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2023, No. 3. - Energy Consumption of Protected Cryptographic Hardware Cores – An Experimental Study
Aein Rezaei Shahmirzadi, Thorben Moos, Amir Moradi, 14th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2023. - Red Team vs. Blue Team: A Real-World Hardware Trojan Detection Case Study Across Four Modern CMOS Technology Generations
Endres Puschner, Thorben Moos, Christian Kison, Steffen Becker, Amir Moradi, Christof Paar, IEEE Symposium on Security and Privacy (SP), 2023. - Low-Latency and Low-Randomness Second-Order Masked Cubic Functions
Aein Rezaei Shahmirzadi, Siemen Dhooghe, Amir Moradi, IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2023, No. 1, pp. 113-152.
- Transitional Leakage in Theory and Practice Unveiling Security Flaws in Masked Circuits
Nicolai Müller, David Knichel, Pascal Sasdrich, Amir Moradi, IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2022, No. 2, pp. 266-288. - Composable Gadgets with Reused Fresh Masks First-Order Probing-Secure Hardware Circuits with only 6 Fresh Masks
David Knichel, Amir Moradi, IACR Transactions on Cryptographic Hardware and Embedded Systems, Vo. 2022, No. 3, pp. 114-140. - Beware of Insufficient Redundancy An Experimental Evaluation of Code-based FI Countermeasures
Timo Bartkewitz, Sven Bettendorf, Thorben Moos, Amir Moradi, Falk Schellenberg, IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2022, No. 3, pp. 438-462. - Randomness Optimization for Gadget Compositions in Higher-Order Masking
Jakob Feldtkeller, David Knichel, Pascal Sasdrich, Amir Moradi, Tim Güneysu, IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2022, No. 4, pp. 188-227. - PROLEAD A Probing-Based Hardware Leakage Detection Tool. IACR Trans
Nicolai Müller, Amir Moradi, IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2022, No. 4, pp. 311-348. - Second-Order Low-Randomness d + 1 Hardware Sharing of the AES
Siemen Dhooghe, Aein Rezaei Shahmirzadi, Amir Moradi, ACM SIGSAC Conference on Computer and Communications Security (CCS ’22). Association for Computing Machinery, pp. 815-828, 2022. - Low-Latency Hardware Private Circuits
David Knichel, Amir Moradi, ACM SIGSAC Conference on Computer and Communications Security (CCS ’22). Association for Computing Machinery, pp. 1799-1812, 2022. - A Cautionary Note on Protecting Xilinx‘ UltraScale(+) Bitstream Encryption and Authentication Engine
Maik Ender, Gregor Leander, Amir Moradi, Christof Paar, IEEE 30th Annual International Symposium on Field-Programmable Custom Computing Machines (FCCM), pp. 1-9, 2022. - Security Analysis of Delay-Based Strong PUFs with Multiple Delay Lines
Anita Aghaie, Amir Moradi, Johannes Tobisch, Nils Wisiol, IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp. 125-128, 2022. - Does Aging Matter? The Curious Case of Fault Sensitivity Analysis
Mohammad Ebrahimabadi, Bijan Fadaeinia, Amir Moradi, Naghmeh Karimi, International Symposium on Quality Electronic Design (ISQED), pp. 84-89, 2022. - Automated Generation of Masked Hardware
David Knichel, Amir Moradi, Nicolai Müller, Pascal Sasdrich – IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2022, No. 1, pp. 589-629. - Cryptanalysis of Efficient Masked Ciphers: Applications to Low Latency
Tim Beyne, Siemen Dhooghe, Amir Moradi, Aein Rezaei Shahmirzadi – IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2022, No. 1, pp. 679-721. - Generic Hardware Private Circuits – Towards Automated Generation of Composable Secure Gadgets
David Knichel, Pascal Sasdrich, Amir Moradi – IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2022, No. 1, pp. 323-344.
- Low-Latency Hardware Masking of PRINCE
Nicolai Müller, Thorben Moos, Amir Moradi – 12th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2021, Lugano, Switzerland, October 25-27, 2021. - PUFs Physical Learning: Accelerating the Enrollment via Delay-based Model Extraction
Anita Aghaie, Maik Ender, Amir Moradi – IEEE Transactions on Emerging Topics in Computing, Vol. 10, No. 3, pp. 1621-1632, 2021. - FIVER – Robust Verification of Countermeasures against Fault Injections
Jan Richter-Brockmann, Aein Rezaei Shahmirzadi, Pascal Sasdrich, Amir Moradi, Tim Güneysu – IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2021, No. 4, pp. 447-473. - Let’s Take it Offline: Boosting Brute-Force Attacks on iPhone’s User Authentication through SCA
Oleksiy Lisovets, David Knichel, Thorben Moos, Amir Moradi – IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2021, No. 3, pp. 496-519. - Low-Latency Keccak at any Arbitrary Order
Sara Zarei, Aein Rezaei Shahmirzadi, Hadi Soleimany, Raziye Salarifard, Amir Moradi – IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2021, No. 4, pp. 388-411. - New First-Order Secure AES Performance Records
Aein Rezaei Shahmirzadi, Dušan Božilov, Amir Moradi – IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2021, No. 2, pp. 304-327. - Re-Consolidating First-Order Masking Schemes – Nullifying Fresh Randomness
Aein Rezaei Shahmirzadi, Amir Moradi – IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2021, No. 1, pp. 305-342. - Second-Order SCA Security with almost no Fresh Randomness
Aein Rezaei Shahmirzadi, Amir Moradi – IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2021, No. 3, pp. 708-755. - Countermeasures against Static Power Attacks – Comparing Exhaustive Logic Balancing and Other Protection Schemes in 28 nm CMOS
Thorben Moos, Amir Moradi – IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2021, No. 3, pp. 780-805. - DL-LA: Deep Learning Leakage Assessment: A modern roadmap for SCA evaluations
Thorben Moos, Felix Wegener, Amir Moradi – IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2021, No. 3, pp. 552-598. - Inconsistency of Simulation and Practice in Delay-based Strong PUFs
Anita Aghaie, Amir Moradi – IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2021, No. 3, pp. 520-551. - The SPEEDY Family of Block Ciphers – Engineering an Ultra Low-Latency Cipher from Gate Level for Secure Processor Architectures
Gregor Leander, Thorben Moos, Amir Moradi, Shahram Rasoolzadeh – IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2021, No. 4, pp. 510-545. - Impeccable Circuits III
Shahram Rasoolzadeh, Aein Rezaei Shahmirzadi, Amir Moradi – IEEE International Test Conference, ITC 2021, October 10-15, 2021 - Balancing the Leakage Currents in Nanometer CMOS Logic — A Challenging Goal
Bijan Fadaeinia, Thorben Moos, Amir Moradi – Applied Sciences Vol. 11, no. 15:7143, Special Issue on Side Channel Attacks in Embedded Systems, 2021. - Masked SABL: a Long Lasting Side-Channel Protection Design Methodology
Bijan Fadaeinia, Md Toufiq Hasan Anik, Naghmeh Karimi, Amir Moradi – IEEE Access, Volume 9, Pages 90455 – 90464, 2021. - Real-World Snapshots vs. Theory: Questioning the t-Probing Security Model
Thilo Krachenfels, Fatemeh Ganji, Amir Moradi, Shahin Tajik, Jean-Pierre Seifert – IEEE Symposium on Security and Privacy (SP), pp. 1955-1971, 2021. - Automated Masking of Software Implementations on Industrial Microcontrollers
Arnold Abromeit, Florian Bache, Leon A. Becker, Marc Gourjon, Tim Güneysu, Sabrina Jorn, Amir Moradi, Maximilian Orlt, Falk Schellenberg – Design, Automation & Test in Europe Conference & Exhibition, DATE 2021, February 1 – 5 , 2021. - Stealthy Logic Misuse for Power Analysis Attacks in Multi-Tenant FPGAs
Dennis R. E. Gnad, Vincent Meyers, Nguyen Minh Dang, Falk Schellenberg, Amir Moradi, Mehdi B. Tahoori – Design, Automation & Test in Europe Conference & Exhibition, DATE 2021, February 1 – 5 , 2021. - On the Impact of Aging on Power Analysis Attacks Targeting Power-Equalized Cryptographic Circuits
Md Toufiq Hasan Anik, Bijan Fadaeinia, Amir Moradi, Naghmeh Karimi – 26th Asia and South Pacific Design Automation Conference, ASP-DAC 2021, January 18-21, 2021.
- SILVER – Statistical Independence and Leakage Verification
David Knichel, Pascal Sasdrich, Amir Moradi – 26th Annual International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2020, December 6-10, 2020. - Clock Glitch versus SIFA
Aein Rezaei Shahmirzadi, Amir Moradi – 33rd IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems, DFT 2020, ESA-ESRIN, Frascati, Italy, October 19-21, 2020. - The Unpatchable Silicon: A Full Break of the Bitstream Encryption of Xilinx 7-Series FPGAs
Maik Ender, Amir Moradi, Christof Paar – 29th USENIX Security Symposium (USENIX Security 20), Boston, MA, USA, August 12-14, 2020. Distinguished Paper Award - Impeccable Circuits IIAein Rezaei Shahmirzadi, Shahram Rasoolzadeh, Amir Moradi – 57th Annual Design Automation Conference 2020, DAC 2020, San Francisco, CA, USA, July 19-23, 2020.
- Lightweight Ciphers on a 65 nm ASIC – A Comparative Study on Energy ConsumptionBastian Richter, Amir Moradi – IEEE Computer Society Annual Symposium on VLSI (ISVLSI) 2020, Limassol, CYPRUS, July 6-8, 2020.
- The Risk of Outsourcing: Hidden SCA Trojans in Third-Party IP-Cores Threaten Cryptographic ICs
David Knichel, Thorben Moos, Amir Moradi – 25th IEEE European Test Symposium, Tallin, Estonia, May 25-29, 2020. - Template attacks on nano-scale CMOS devices
Bastian Richter, Amir Moradi – Journal of Cryptographic Engineering, Volume 10, pages 275–285, 2020. - Cryptographic Fault Diagnosis using VerFI
Victor Arribas, Felix Wegener, Amir Moradi, Svetla Nikova – IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2020, San Jose, USA, May 4-7, 2020. - Side-Channel Hardware Trojan for Provably-Secure SCA-Protected Implementations
Samaneh Ghandali, Thorben Moos, Amir Moradi, Christof Paar – IEEE Transactions on Very Large Scale Integration (VLSI) Systems, Volume 28, Issue 6, 2020. - TI-PUF: Toward Side-Channel Resistant Physical Unclonable Functions
Anita Aghaie, Amir Moradi – IEEE Transactions on Information Forensics and Security, Volume 15, Pages 3470 – 3481, 2020. - 3-Phase Adiabatic Logic and its Sound SCA Evaluation
Bijan Fadaeinia, Amir Moradi – IEEE Transactions on Emerging Topics in Computing, vol. 9, no. 4, pp. 2175-2188, 2020. - Spin Me Right Round Rotational Symmetry for FPGA-Specific AES: Extended Version
Felix Wegener, Lauren De Meyer, Amir Moradi – Journal of Cryptology volume 33, pages 1114–1155, 2020. - Remote Electrical-level Security Threats to Multi-Tenant FPGAs
Dennis R.E. Gnad, Falk Schellenberg, Jonas Krautter, Amir Moradi, Mehdi B. Tahoori – IEEE Design & Test, Volume 37, Issue 2, April 2020.
- A Comparison of χ²-Test and Mutual Information as Distinguisher for Side-Channel Analysis
Bastian Richter, David Knichel, Amir Moradi – 18th Smart Card Research and Advanced Application Conference, CARDIS 2019, Prague, Czech Republic, November 11-13, 2019. - Active Fences against Voltage-based Side Channels in Multi-Tenant FPGAs
Jonas Krautter, Dennis Gnad, Falk Schellenberg, Amir Moradi, Mehdi B. Tahoori – International Conference On Computer Aided Design, ICCAD 2019, Westminster, Colorado, USA, November 4-7, 2019. - Automated Probe Repositioning for On-Die EM Measurements
Bastian Richter, Alexander Wild, Amir Moradi – International Conference On Computer Aided Design, ICCAD 2019, Westminster, Colorado, USA, November 4-7, 2019. - Impeccable Circuits
Anita Aghaie, Amir Moradi, Shahram Rasoolzadeh, Aein Rezaei Shahmirzadi, Falk Schellenberg, Tobias Schneider – IEEE Transactions on Computers, 2019. - Static Power Side-Channel Analysis – An Investigation of Measurement Factors
Thorben Moos, Amir Moradi, Bastian Richter – IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 2019. - Exploring the Effect of Device Aging on Static Power Analysis Attacks
Naghmeh Karimi, Thorben Moos, Amir Moradi – IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2019, No. 3, pp 233-256, 2019. - Glitch-Resistant Masking Revisited or Why Proofs in the Robust Probing Model are Needed
Thorben Moos, Amir Moradi, Tobias Schneider, François-Xavier Standaert – IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2019, No. 2, pp 256-292, 2019. best paper award - Shuffle and Mix: On the Diffusion of Randomness in Threshold Implementations of Keccak
Felix Wegener, Christian Baiker, Amir Moradi – International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2019, Darmstadt, Germany, April 3-5, 2019. - CRAFT: Lightweight Tweakable Block Cipher with Efficient Protection Against DFA Attacks
Christof Beierle, Gregor Leander, Amir Moradi, Shahram Rasoolzadeh – IACR Transactions on Symmetric Cryptology, Vol. 2019, No. 1, pp 5-45, 2019.
- Yet Another Size Record for AES: A First-Order SCA Secure AES S-box Based on GF(2^8) Multiplication
Felix Wegener, Amir Moradi – 17th Smart Card Research and Advanced Application Conference, CARDIS 2018, Montpellier, France, November 12-14, 2018. - Remote Inter-Chip Power Analysis Side-Channel Attacks at Board-Level
Falk Schellenberg, Dennis R.E. Gnad, Amir Moradi, Mehdi B. Tahoori – International Conference On Computer Aided Design, ICCAD 2018, San Diego, CA, USA, November 5-8, 2018. - Hardware Masking, Revisited
Thomas De Cnudde, Maik Ender, Amir Moradi – IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2018, No. 2, pp 123-148, 2018. - Leakage Detection with the χ²-Test
Amir Moradi, Bastian Richter, Tobias Schneider, François-Xavier Standaert – IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2018, No. 1, pp 209-237, 2018. - Spin Me Right Round – Rotational Symmetry for FPGA-Specific AES
Lauren De Meyer, Amir Moradi, Felix Wegener – IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2018, No. 3, pp 596-626, 2018. - Threshold Implementation in Software – Case Study of PRESENT
Pascal Sasdrich, Rene Bock, Amir Moradi – 9th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2018, Singapore, April 23-24, 2018. - A First-Order SCA Resistant AES without Fresh Randomness
Felix Wegener, Amir Moradi – International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2018, Singapore, April 23-24, 2018. - An Inside Job: Remote Power Analysis Attacks on FPGAs
Falk Schellenberg, Dennis R.E. Gnad, Amir Moradi, Mehdi B. Tahoori – Design, Automation & Test in Europe Conference & Exhibition, DATE 2018, Dresden, Germany, March 18 – 23 , 2018. best paper candidate. - Bitstream Fault Injections (BiFI) – Automated Fault Attacks against SRAM-based FPGAs
Pawel Swierczynski, Georg T. Becker, Amir Moradi, Christof Paar – IEEE Transactions on Computers, vol. 67, no. 3, pp. 348-360, 2018.GliFreD: Glitch-Free Duplication – Towards Power-Equalized Circuits on FPGAs
Alexander Wild, Amir Moradi, Tim Güneysu – IEEE Transactions on Computers, vol. 67, no. 3, pp. 375-387, 2018.
- The First Thorough Side-Channel Hardware Trojan
Maik Ender, Samaneh Ghandali, Amir Moradi, Christof Paar – International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2017, Hong Kong, China, December 3 – 7, 2017. - Bit-Sliding: A Generic Technique for Bit-Serial Implementations of SPN-based Primitives
Jérémy Jean, Amir Moradi, Thomas Peyrin, Pascal Sasdrich – Workshop on Cryptographic Hardware and Embedded Systems, CHES 2017, Taipei, Taiwan, September 25 – 28, 2017. - On the Easiness of Turning Higher-Order Leakages into First-Order
Thorben Moos, Amir Moradi – 8th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2017, Paris, France, April 13-14, 2017. - SafeDRP: Yet Another Way Toward Power-Equalized Designs in FPGA
Maik Ender, Alexander Wild, Amir Moradi – International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2017, Paris, France, April 13-14, 2017. - SPARX – A Side-Channel Protected Processor for ARX-based Cryptography
Florian Bache, Tobias Schneider, Amir Moradi, Tim Güneysu – Design, Automation & Test in Europe Conference & Exhibition, DATE 2017, Lausanne, Switzerland, March 27 – 31 , 2017. - Static Power Side-Channel Analysis of a Threshold Implementation Prototype Chip
Thorben Moos, Amir Moradi, Bastian Richter – Design, Automation & Test in Europe Conference & Exhibition, DATE 2017, Lausanne, Switzerland, March 27 – 31 , 2017. best paper candidate. - Hiding Higher-Order Side-Channel Leakage – Randomizing Cryptographic Implementations in Reconfigurable Hardware
Pascal Sasdrich, Amir Moradi, Tim Güneysu – RSA Conference Cryptographers’ Track, CT-RSA 2017, San Francisco, February 14-17 2017.
- Side-Channel Analysis Protection and Low-Latency in Action – case study of PRINCE and Midori
Amir Moradi, Tobias Schneider – International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2016, Hanoi, Vietnam, December 4 – 8, 2016. - Moments-Correlating DPA
Amir Moradi, François-Xavier Standaert – Theory of Implementation Security (TIs) Workshop (of ACM CCS 2016), Vienna, Austria, October 24, 2016. - Strong 8-bit Sboxes with Efficient Masking in Hardware
Erik Boss, Vincent Grosso, Tim Güneysu, Gregor Leander, Amir Moradi, Tobias Schneider – Workshop on Cryptographic Hardware and Embedded Systems, CHES 2016, Santa Barbara, California, USA, August 17 – 19, 2016. - ParTI – Towards Combined Hardware Countermeasures against Side-Channel and Fault-Injection Attacks
Tobias Schneider, Amir Moradi, Tim Güneysu – International Cryptology Conference – CRYPTO 2016, Santa Barbara, California, USA, August 14 – 18, 2016. - The SKINNY Family of Block Ciphers and its Low-Latency Variant MANTIS
Christof Beierle, Jérémy Jean, Stefan Kölbl, Gregor Leander, Amir Moradi, Thomas Peyrin, Yu Sasaki, Pascal Sasdrich, Siang Meng Sim – International Cryptology Conference – CRYPTO 2016, Santa Barbara, California, USA, August 14 – 18, 2016. - Bridging the Gap: Advanced Tools for Side-Channel Leakage Estimation beyond Gaussian Templates and Histograms
Tobias Schneider, Amir Moradi, François-Xavier Standaert, Tim Güneysu – 23nd International Conference on Selected Areas in Cryptography, SAC 2016, St. John’s, NL, Canada, August 10–12, 2016. - Interdiction in Practice – Hardware Trojan Against a High-Security USB Flash Drive
Pawel Swierczynski, Marc Fyrbiak, Philipp Koppe, Amir Moradi, Christof Paar – Journal of Cryptographic Engineering, Springer, June 2016. - Large Laser Spots and Fault Sensitivity Analysis
Falk Schellenberg, Markus Finkeldey, Nils C. Gerhardt, Martin R. Hofmann , Amir Moradi, Christof Paar – IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2016, McLean, VA, USA, May 3-5, 2016. best student-paper award. - Improved Side-Channel Analysis Attacks on Xilinx Bitstream Encryption of 5, 6, and 7 Series
Amir Moradi, Tobias Schneider – 7th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2016, Gray, Austria, April 14-15, 2016. - Robust and One-Pass Parallel Computation of Correlation-Based Attacks at Arbitrary Order
Tobias Schneider, Amir Moradi, Tim Güneysu – 7th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2016, Gray, Austria, April 14-15, 2016. - White-Box Cryptography in the Gray Box – A Hardware Implementation and its Side Channels
Pascal Sasdrich, Amir Moradi, Tim Güneysu – 23rd International Conference on Fast Software Encryption, FSE 2016, Bochum, Germany, March 20-23 2016. - Leakage Assessment Methodology – Extended Version
Tobias Schneider, Amir Moradi – Journal of Cryptographic Engineering June 2016, Volume 6, Issue 2, pp 85–99.
- Assessment of Hiding the Higher-Order Leakages in Hardware – what are the achievements versus overheads?
Amir Moradi, Alexander Wild – Workshop on Cryptographic Hardware and Embedded Systems, CHES 2015, Saint-Malo, France, September 13 – 16, 2015. best paper candidate. - Leakage Assessment Methodology – a clear roadmap for side-channel evaluations
Tobias Schneider, Amir Moradi – Workshop on Cryptographic Hardware and Embedded Systems, CHES 2015, Saint-Malo, France, September 13 – 16, 2015. - Affine Equivalence and its Application to Tightening Threshold Implementations
Pascal Sasdrich, Amir Moradi, Tim Güneysu – 22nd International Conference on Selected Areas in Cryptography, SAC 2015, Mount Allison University Sackville, New Brunswick, Canada, August 12-14 2015. - Advances in Side-Channel Security
Amir Moradi – Habilitation Thesis, Ruhr University Bochum, Germany, 2015. - Arithmetic Addition over Boolean Masking – Towards First- and Second-Order Resistance in Hardware
Tobias Schneider, Amir Moradi, Tim Güneysu – International Conference on Applied Cryptography and Network Security – ACNS 2015, New York, USA, 2–5 June 2015. - Achieving Side-Channel Protection with Dynamic Logic Reconfiguration on Modern FPGAs
Pascal Sasdrich, Amir Moradi, Oliver Mischke, Tim Güneysu – IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2015, McLean, VA, USA, May 5-7, 2015. - A Hardware-based Countermeasure to Reduce Side-Channel Leakage – Design, Implementation, and Evaluation
Andreas Gornik, Amir Moradi, Jürgen Oehm, Christof Paar – IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, Vol. 34, No.8, pages 1308-1319, 2015. - Evaluating the Duplication of Dual-Rail Precharge Logics on FPGAs
Alexander Wild, Amir Moradi, Tim Güneysu – 6th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2015, Berlin, Germany, April 13-14, 2015. - Side-Channel Protection by Randomizing Look-Up Tables on Reconfigurable Hardware – Pitfalls of Memory Primitives
Pascal Sasdrich, Oliver Mischke, Amir Moradi, Tim Güneysu – 6th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2015, Berlin, Germany, April 13-14, 2015. - Side-Channel Security Analysis of Ultra-Low-Power FRAM-based MCUs
Amir Moradi, Gesine Hinterwälder – 6th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2015, Berlin, Germany, April 13-14, 2015. best paper award. - Side-Channel Attacks from Static Power: When Should we Care?
Santos Merino Del Pozo, François-Xavier Standaert, Dina Kamel, Amir Moradi – Design, Automation & Test in Europe Conference & Exhibition, DATE 2015, Grenoble, France, March 9 – 13 , 2015.
- Wire-Tap Codes as Side-Channel Countermeasure – an FPGA-based experiment
Amir Moradi – 15th International Conference on Cryptology in India, Indocrypt 2014, New Delhi, December 14 – 17, 2014. - Physical Security Evaluation of the Bitstream Encryption Mechanism of Altera Stratix II and Stratix III FPGAs
Pawel Swierczynski, Amir Moradi, David Oswald, Christof Paar – ACM Transactions on Reconfigurable Technology and Systems (TRETS), Volume 7 Issue 4, December 2014. - Full-Size High-Security ECC Implementation on MSP430 Microcontrollers
Gesine Hinterwälder, Amir Moradi, Michael Hutter, Peter Schwabe, Christof Paar – Third International Conference on Cryptology and Information Security in Latin America, Latincrypt 2014, Florianópolis, Brazil, September 17 – 19, 2014. - Early Propagation and Imbalanced Routing, How to Diminish in FPGAs
Amir Moradi, Vincent Immler – Workshop on Cryptographic Hardware and Embedded Systems, CHES 2014, Busan, Korea, September 23 – 26, 2014. - Side-Channel Leakage through Static Power – Should We Care about in Practice?
Amir Moradi – Workshop on Cryptographic Hardware and Embedded Systems, CHES 2014, Busan, Korea, September 23 – 26, 2014. - Fault Sensitivity Analysis Meets Zero-Value Attack
Oliver Mischke, Amir Moradi, Tim Güneysu – Fault Diagnosis and Tolerance in Cryptography – FDTC 2014, Busan, Korea, September 23, 2013. - Detecting Hidden Leakages
Amir Moradi, Sylvain Guilley, Annelie Heuser – International Conference on Applied Cryptography and Network Security – ACNS 2014, Lausanne, Switzerland, June 10 – 13, 2014. best-paper award.
- Comprehensive Evaluation of AES Dual Ciphers as a Side-Channel Countermeasure
Amir Moradi, Oliver Mischke – International Conference on Information and Communications Security, ICICS 2013, Beijing, China, November 20 – 22, 2013. - One Attack to Rule Them All: Collision Timing Attack versus 42 AES ASIC Cores
Amir Moradi, Oliver Mischke, Christof Paar – IEEE Transactions on Computers, vol. 62, no. 9, pp. 1786-1798, Sept. 2013. - On the Simplicity of Converting Leakages from Multivariate to Univariate – Case Study of a Glitch-Resistant Masking Scheme
Amir Moradi, Oliver Mischke – Workshop on Cryptographic Hardware and Embedded Systems, CHES 2013, Santa Barbara, California, USA, August 20 – 23, 2013. - Attacking Atmel’s CryptoMemory EEPROM with Special-Purpose Hardware
Alexander Wild, Tim Güneysu, Amir Moradi – Applied Cryptography and Network Security – 11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013. - Side-Channel Attacks on the Bitstream Encryption Mechanism of Altera Stratix II – Facilitating Black-Box Analysis using Software Reverse-Engineering
Amir Moradi, David Oswald, Christof Paar, Pawel Swierczynski – 21st ACM/SIGDA International Symposium on Field-Programmable Gate Arrays- FPGA 2013, pages 91-100, February 11 – 13. ACM, 2013.
- Side Channels as Building Blocks
Markus Kasper, Amir Moradi, Georg T. Becker, Oliver Mischke, Tim Güneysu, Christof Paar, Wayne Burleson – Journal of Cryptographic Engineering, Volume 2, Number 3, pages 143-159, 2012, Springer. - How Far Should Theory be from Practice? – Evaluation of a Countermeasure
Amir Moradi, Oliver Mischke – Cryptographic Hardware and Embedded Systems – CHES 2012 – 14th International Workshop, Leuven, Belgium, September 9-12, 2012. - Glitch-Free Implementation of Masking in Modern FPGAs
Amir Moradi, Oliver Mischke – 2012 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2012, San Francisco, CA, USA, June 3-4, 2012. - Statistical Tools Flavor Side-Channel Collision Attacks
Amir Moradi – Advances in Cryptology – EUROCRYPT 2012 – 31th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, United Kingdom, April 15-19, 2012, pages 428-445. - Black-Box Side-Channel Attacks Highlight the Importance of Countermeasures – An Analysis of the Xilinx Virtex-4 and Virtex-5 Bitstream Encryption Mechanism
Amir Moradi, Markus Kasper, Christof Paar – Topics in Cryptology – CT-RSA 2012 – The Cryptographers‘ Track at the RSA Conference, San Francisco, CA, USA, February 27- March 2, 2012, pages 1-18.
- Praktische Angriffe auf die Bitstromverschlüsselung von Xilinx FPGAs
Markus Kasper, Timo Kasper, Amir Moradi, Christof Paar – Datenschutz und Datensicherheit – DuD – Ausgabe 11/2011. - On the Vulnerability of FPGA Bitstream Encryption against Power Analysis Attacks – Extracting Keys from Xilinx Virtex-II FPGAs
Amir Moradi, Alessandro Barenghi, Timo Kasper, Christof Paar – 18th ACM Conference on Computer and Communications Security, CCS 2011, Chicago, IL, USA, October 17-21, 2011, pages 111-124. - Generic Side-Channel Countermeasures for Reconfigurable Devices
Tim Güneysu, Amir Moradi – Cryptographic Hardware and Embedded Systems – CHES 2011 – 13th International Workshop, Nara, Japan, September 28 – October 1, 2011. - On the Power of Fault Sensitivity Analysis and Collision Side-Channel Attacks in a Combined Setting
Amir Moradi, Oliver Mischke, Christof Paar, Yang Li, Kazuo Ohta, Kazuo Sakiyama – Cryptographic Hardware and Embedded Systems – CHES 2011 – 13th International Workshop, Nara, Japan, September 28 – October 1, 2011. - Masked Dual-Rail Precharge Logic Encounters State-of-the-Art Power Analysis Methods
Amir Moradi, Mario Kirschbaum, Thomas Eisenbarth, Christof Paar – IEEE Transactions on Very Large Scale Integration Systems, Volume 20 , Issue 9, Pages 1578 – 1589, 2012. - Practical Evaluation of DPA Countermeasures on Reconfigurable Hardware
Amir Moradi, Oliver Mischke, Christof Paar – HOST 2011, Proceedings of the 2011 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), 5-6 June 2011, San Diego, California, USA. - Pushing the Limits: A Very Compact and a Threshold Implementation of AES
Amir Moradi, Dipl.-Kfm. Axel Poschmann, San Ling, Christof Paar, Huaxiong Wang – Advances in Cryptology – EUROCRYPT 2011 – 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011, volume 6632 of LNCS, pages 69-88, Springer. - Side-Channel Resistant Crypto for less than 2,300 GE
Axel Poschmann, Amir Moradi, Khoongming Khoo, Chu-Wee Lim, Huaxiong Wang, San Ling – Journal of Cryptology, Special Issue on Hardware and Security, Volume 24, Number 2, pages 322-345, April 2011.
- Side-channel based watermarks for IP Protection
Georg T. Becker, Markus Kasper, Amir Moradi, Christof Paar – COSADE 2010 – First International Workshop on Constructive Side-Channel Analysis and Secure Design. - Correlation-Enhanced Power Analysis Collision Attack
Amir Moradi, Oliver Mischke, Thomas Eisenbarth – Cryptographic Hardware and Embedded Systems, CHES 2010, 12th International Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings - Side-channel based watermarks for integrated circuits
Georg T. Becker, Markus Kasper, Amir Moradi, Christof Paar – IEEE International Symposium on Hardware-Oriented Security and Trust (HOST 2010), AnaheimCA , USA, 13-14 June 2010. - Practical Power Analysis Attacks on Software Implementations of McEliece
Stefan Heyse, Amir Moradi, Christof Paar – Post-Quantum Cryptography, Third International Workshop, PQCrypto 2010, Darmstadt, Germany, May 25-28, 2010. Proceedings - Lightweight Cryptography and DPA Countermeasures: A Survey
Amir Moradi, Axel Poschmann – First International Workshop on Lightweight Cryptography for Resource-Constrained Devices, WLC 2010 (co-located with Financial Cryptography and Data Security – FC 2010), Tenerife, Canary Islands, Spain, Januar 25-28, 2010.
- A New Remote Keyless Entry System Resistant to Power Analysis Attacks
Amir Moradi, Timo Kasper – 7th International Conference on Information, Communications and Signal Processing, ICICS 2009, Macau, China, December 7-10, 2009. - Power Analysis of Single-Rail Storage Elements as used in MDPL
Amir Moradi, Thomas Eisenbarth, Dipl.-Kfm. Axel Poschmann, Christof Paar – 12th International Conference on Information Security and Cryptology – ICISC 2009, Seoul, Korea, December 2-4, 2009. - KeeLoq and Side-Channel Analysis – Evolution of an Attack
Christof Paar, Thomas Eisenbarth, Markus Kasper, Timo Kasper, Amir Moradi – 6th IEEE Workshop on Fault Diagnosis and Tolerance in Cryptography – FDTC 2009.Lausanne, Switzerland, September 6, 2009. - A Comparative Study of Mutual Information Analysis under a Gaussian Assumption
Amir Moradi, Nima Mousavi, Christof Paar, Mahmoud Salmasizadeh – 10th International Workshop on Information Security Applications, WISA 2009, Busan, Korea. August 25-27, 2009. - Breaking KeeLoq in a Flash: On Extracting Keys at Lightning Speed
Markus Kasper, Timo Kasper, Amir Moradi, Christof Paar – 2nd International Conference on Cryptology in Africa, Progress in Cryptology – AFRICACRYPT 2009, Gammarth, Tunisia, 21-25 Juni, 2009. - Dual-rail transition logic: A logic style for counteracting power analysis attacks
Amir Moradi, Mohammad Taghi Manzuri Shalmani, Mahmoud Salmasizadeh, Computers & Electrical Engineering, Volume 35, Issue 2, Pages 359-369, 2009. - Vulnerability modeling of cryptographic hardware to power analysis attacks
Amir Moradi, Mahmoud Salmasizadeh, Mohammad T. Manzuri Shalmani, Thomas Eisenbarth, Integration, Volume 42, Issue 4, Pages 468-478, 2009. - Charge recovery logic as a side channel attack countermeasure
Amir Moradi, Mehrdad Khatir, Mahmoud Salmasizadeh, Mohammad T. Manzuri Shalmani, 10th International Symposium on Quality Electronic Design (ISQED), pp. 686-691, 2009. - A Comparative Study of Mutual Information Analysis under a Gaussian Assumption
Amir Moradi, Nima Mousavi, Christof Paar, Mahmoud Salmasizadeh, Information Security Applications, 10th International Workshop (WISA), Lecture Notes in Computer Science, vol 5932., pp. 193-205, 2009.
- On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoq Code Hopping Scheme
Thomas Eisenbarth, Timo Kasper, Amir Moradi, Christof Paar, Mahmoud Salmasizadeh, Mohammad T. Manzuri Shalmani – 28th International Cryptology Conference — CRYPTO 2008. Santa Barbara, California, USA. August 17-21, 2008. - Susceptibility of eSTREAM Candidates towards Side Channel Analysis
Benedikt Gierlichs, Lejla Batina, Christophe Clavier, Thomas Eisenbarth, Aline Gouget, Helena Handschuh, Timo Kasper, Kerstin Lemke-Rust, Stefan Mangard, Amir Moradi, Elisabeth Oswald – The State of the Art of Stream Ciphers, SASC 2008, Lausanne, Switzerland. Februar, 13-14 2008. - On the Importance of the Number of Fanouts to Prevent the Glitches in DPA-Resistant Devices
Amir Moradi, Mahmoud Salmasizadeh, Mohammad Taghi Manzuri Shalmani, Advances in Computer Science and Engineering. CSICC 2008. Communications in Computer and Information Science, vol 6., pp. 661-670, 2008. - A secure and low-energy logic style using charge recovery approach
Mehrdad Khatir, Amir Moradi, Alireza Ejlali, Mohammad T. Manzuri Shalmani, Mahmoud Salmasizadeh, international symposium on Low Power Electronics & Design (ISLPED ’08). Association for Computing Machinery, pp. 259-264, 2008.
- Compact and Secure Design of Masked AES S-Box
Babak Zakeri, Mahmoud Salmasizadeh, Amir Moradi, Mahmoud Tabandeh, Mohammad T. Manzuri Shalmani, Information and Communications Security. ICICS 2007. Lecture Notes in Computer Science, vol 4861, pp. 216-229, 2007. - Power Analysis Attacks on MDPL and DRSL Implementations
Amir Moradi, Mahmoud Salmasizadeh, Mohammad T. Manzuri Shalmani, Information Security and Cryptology – ICISC 2007. Lecture Notes in Computer Science, vol 4817, pp. 259-272, 2007.
- A Generalized Method of Differential Fault Attack Against AES Cryptosystem
Amir Moradi, Mohammad T. Manzuri Shalmani, Mahmoud Salmasizadeh, Cryptographic Hardware and Embedded Systems – CHES 2006. Lecture Notes in Computer Science, vol 4249, pp. 91-100, 2006.
Publications
- 2023
- PROLEAD_SW – Probing-Based Software Leakage Detection for ARM Binaries
Jannik Zeitschner, Nicolai Müller, Amir Moradi, IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2023, No. 3. - Deep Learning Side-Channel Collision Attack
Marvin Staib, Amir Moradi, IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2023, No. 3. - Energy Consumption of Protected Cryptographic Hardware Cores – An Experimental Study
Aein Rezaei Shahmirzadi, Thorben Moos, Amir Moradi, 14th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2023. - Red Team vs. Blue Team: A Real-World Hardware Trojan Detection Case Study Across Four Modern CMOS Technology Generations
Endres Puschner, Thorben Moos, Christian Kison, Steffen Becker, Amir Moradi, Christof Paar, IEEE Symposium on Security and Privacy (SP), 2023. - Low-Latency and Low-Randomness Second-Order Masked Cubic Functions
Aein Rezaei Shahmirzadi, Siemen Dhooghe, Amir Moradi, IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2023, No. 1, pp. 113-152.
- PROLEAD_SW – Probing-Based Software Leakage Detection for ARM Binaries
- 2022
- Transitional Leakage in Theory and Practice Unveiling Security Flaws in Masked Circuits
Nicolai Müller, David Knichel, Pascal Sasdrich, Amir Moradi, IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2022, No. 2, pp. 266-288. - Composable Gadgets with Reused Fresh Masks First-Order Probing-Secure Hardware Circuits with only 6 Fresh Masks
David Knichel, Amir Moradi, IACR Transactions on Cryptographic Hardware and Embedded Systems, Vo. 2022, No. 3, pp. 114-140. - Beware of Insufficient Redundancy An Experimental Evaluation of Code-based FI Countermeasures
Timo Bartkewitz, Sven Bettendorf, Thorben Moos, Amir Moradi, Falk Schellenberg, IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2022, No. 3, pp. 438-462. - Randomness Optimization for Gadget Compositions in Higher-Order Masking
Jakob Feldtkeller, David Knichel, Pascal Sasdrich, Amir Moradi, Tim Güneysu, IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2022, No. 4, pp. 188-227. - PROLEAD A Probing-Based Hardware Leakage Detection Tool. IACR Trans
Nicolai Müller, Amir Moradi, IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2022, No. 4, pp. 311-348. - Second-Order Low-Randomness d + 1 Hardware Sharing of the AES
Siemen Dhooghe, Aein Rezaei Shahmirzadi, Amir Moradi, ACM SIGSAC Conference on Computer and Communications Security (CCS ’22). Association for Computing Machinery, pp. 815-828, 2022. - Low-Latency Hardware Private Circuits
David Knichel, Amir Moradi, ACM SIGSAC Conference on Computer and Communications Security (CCS ’22). Association for Computing Machinery, pp. 1799-1812, 2022. - A Cautionary Note on Protecting Xilinx‘ UltraScale(+) Bitstream Encryption and Authentication Engine
Maik Ender, Gregor Leander, Amir Moradi, Christof Paar, IEEE 30th Annual International Symposium on Field-Programmable Custom Computing Machines (FCCM), pp. 1-9, 2022. - Security Analysis of Delay-Based Strong PUFs with Multiple Delay Lines
Anita Aghaie, Amir Moradi, Johannes Tobisch, Nils Wisiol, IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp. 125-128, 2022. - Does Aging Matter? The Curious Case of Fault Sensitivity Analysis
Mohammad Ebrahimabadi, Bijan Fadaeinia, Amir Moradi, Naghmeh Karimi, International Symposium on Quality Electronic Design (ISQED), pp. 84-89, 2022. - Automated Generation of Masked Hardware
David Knichel, Amir Moradi, Nicolai Müller, Pascal Sasdrich – IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2022, No. 1, pp. 589-629. - Cryptanalysis of Efficient Masked Ciphers: Applications to Low Latency
Tim Beyne, Siemen Dhooghe, Amir Moradi, Aein Rezaei Shahmirzadi – IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2022, No. 1, pp. 679-721. - Generic Hardware Private Circuits – Towards Automated Generation of Composable Secure Gadgets
David Knichel, Pascal Sasdrich, Amir Moradi – IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2022, No. 1, pp. 323-344.
- Transitional Leakage in Theory and Practice Unveiling Security Flaws in Masked Circuits
- 2021
- Low-Latency Hardware Masking of PRINCE
Nicolai Müller, Thorben Moos, Amir Moradi – 12th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2021, Lugano, Switzerland, October 25-27, 2021. - PUFs Physical Learning: Accelerating the Enrollment via Delay-based Model Extraction
Anita Aghaie, Maik Ender, Amir Moradi – IEEE Transactions on Emerging Topics in Computing, Vol. 10, No. 3, pp. 1621-1632, 2021. - FIVER – Robust Verification of Countermeasures against Fault Injections
Jan Richter-Brockmann, Aein Rezaei Shahmirzadi, Pascal Sasdrich, Amir Moradi, Tim Güneysu – IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2021, No. 4, pp. 447-473. - Let’s Take it Offline: Boosting Brute-Force Attacks on iPhone’s User Authentication through SCA
Oleksiy Lisovets, David Knichel, Thorben Moos, Amir Moradi – IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2021, No. 3, pp. 496-519. - Low-Latency Keccak at any Arbitrary Order
Sara Zarei, Aein Rezaei Shahmirzadi, Hadi Soleimany, Raziye Salarifard, Amir Moradi – IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2021, No. 4, pp. 388-411. - New First-Order Secure AES Performance Records
Aein Rezaei Shahmirzadi, Dušan Božilov, Amir Moradi – IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2021, No. 2, pp. 304-327. - Re-Consolidating First-Order Masking Schemes – Nullifying Fresh Randomness
Aein Rezaei Shahmirzadi, Amir Moradi – IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2021, No. 1, pp. 305-342. - Second-Order SCA Security with almost no Fresh Randomness
Aein Rezaei Shahmirzadi, Amir Moradi – IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2021, No. 3, pp. 708-755. - Countermeasures against Static Power Attacks – Comparing Exhaustive Logic Balancing and Other Protection Schemes in 28 nm CMOS
Thorben Moos, Amir Moradi – IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2021, No. 3, pp. 780-805. - DL-LA: Deep Learning Leakage Assessment: A modern roadmap for SCA evaluations
Thorben Moos, Felix Wegener, Amir Moradi – IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2021, No. 3, pp. 552-598. - Inconsistency of Simulation and Practice in Delay-based Strong PUFs
Anita Aghaie, Amir Moradi – IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2021, No. 3, pp. 520-551. - The SPEEDY Family of Block Ciphers – Engineering an Ultra Low-Latency Cipher from Gate Level for Secure Processor Architectures
Gregor Leander, Thorben Moos, Amir Moradi, Shahram Rasoolzadeh – IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2021, No. 4, pp. 510-545. - Impeccable Circuits III
Shahram Rasoolzadeh, Aein Rezaei Shahmirzadi, Amir Moradi – IEEE International Test Conference, ITC 2021, October 10-15, 2021 - Balancing the Leakage Currents in Nanometer CMOS Logic — A Challenging Goal
Bijan Fadaeinia, Thorben Moos, Amir Moradi – Applied Sciences Vol. 11, no. 15:7143, Special Issue on Side Channel Attacks in Embedded Systems, 2021. - Masked SABL: a Long Lasting Side-Channel Protection Design Methodology
Bijan Fadaeinia, Md Toufiq Hasan Anik, Naghmeh Karimi, Amir Moradi – IEEE Access, Volume 9, Pages 90455 – 90464, 2021. - Real-World Snapshots vs. Theory: Questioning the t-Probing Security Model
Thilo Krachenfels, Fatemeh Ganji, Amir Moradi, Shahin Tajik, Jean-Pierre Seifert – IEEE Symposium on Security and Privacy (SP), pp. 1955-1971, 2021. - Automated Masking of Software Implementations on Industrial Microcontrollers
Arnold Abromeit, Florian Bache, Leon A. Becker, Marc Gourjon, Tim Güneysu, Sabrina Jorn, Amir Moradi, Maximilian Orlt, Falk Schellenberg – Design, Automation & Test in Europe Conference & Exhibition, DATE 2021, February 1 – 5 , 2021. - Stealthy Logic Misuse for Power Analysis Attacks in Multi-Tenant FPGAs
Dennis R. E. Gnad, Vincent Meyers, Nguyen Minh Dang, Falk Schellenberg, Amir Moradi, Mehdi B. Tahoori – Design, Automation & Test in Europe Conference & Exhibition, DATE 2021, February 1 – 5 , 2021. - On the Impact of Aging on Power Analysis Attacks Targeting Power-Equalized Cryptographic Circuits
Md Toufiq Hasan Anik, Bijan Fadaeinia, Amir Moradi, Naghmeh Karimi – 26th Asia and South Pacific Design Automation Conference, ASP-DAC 2021, January 18-21, 2021.
- Low-Latency Hardware Masking of PRINCE
- 2020
- SILVER – Statistical Independence and Leakage Verification
David Knichel, Pascal Sasdrich, Amir Moradi – 26th Annual International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2020, December 6-10, 2020. - Clock Glitch versus SIFA
Aein Rezaei Shahmirzadi, Amir Moradi – 33rd IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems, DFT 2020, ESA-ESRIN, Frascati, Italy, October 19-21, 2020. - The Unpatchable Silicon: A Full Break of the Bitstream Encryption of Xilinx 7-Series FPGAs
Maik Ender, Amir Moradi, Christof Paar – 29th USENIX Security Symposium (USENIX Security 20), Boston, MA, USA, August 12-14, 2020. Distinguished Paper Award - Impeccable Circuits IIAein Rezaei Shahmirzadi, Shahram Rasoolzadeh, Amir Moradi – 57th Annual Design Automation Conference 2020, DAC 2020, San Francisco, CA, USA, July 19-23, 2020.
- Lightweight Ciphers on a 65 nm ASIC – A Comparative Study on Energy ConsumptionBastian Richter, Amir Moradi – IEEE Computer Society Annual Symposium on VLSI (ISVLSI) 2020, Limassol, CYPRUS, July 6-8, 2020.
- The Risk of Outsourcing: Hidden SCA Trojans in Third-Party IP-Cores Threaten Cryptographic ICs
David Knichel, Thorben Moos, Amir Moradi – 25th IEEE European Test Symposium, Tallin, Estonia, May 25-29, 2020. - Template attacks on nano-scale CMOS devices
Bastian Richter, Amir Moradi – Journal of Cryptographic Engineering, Volume 10, pages 275–285, 2020. - Cryptographic Fault Diagnosis using VerFI
Victor Arribas, Felix Wegener, Amir Moradi, Svetla Nikova – IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2020, San Jose, USA, May 4-7, 2020. - Side-Channel Hardware Trojan for Provably-Secure SCA-Protected Implementations
Samaneh Ghandali, Thorben Moos, Amir Moradi, Christof Paar – IEEE Transactions on Very Large Scale Integration (VLSI) Systems, Volume 28, Issue 6, 2020. - TI-PUF: Toward Side-Channel Resistant Physical Unclonable Functions
Anita Aghaie, Amir Moradi – IEEE Transactions on Information Forensics and Security, Volume 15, Pages 3470 – 3481, 2020. - 3-Phase Adiabatic Logic and its Sound SCA Evaluation
Bijan Fadaeinia, Amir Moradi – IEEE Transactions on Emerging Topics in Computing, vol. 9, no. 4, pp. 2175-2188, 2020. - Spin Me Right Round Rotational Symmetry for FPGA-Specific AES: Extended Version
Felix Wegener, Lauren De Meyer, Amir Moradi – Journal of Cryptology volume 33, pages 1114–1155, 2020. - Remote Electrical-level Security Threats to Multi-Tenant FPGAs
Dennis R.E. Gnad, Falk Schellenberg, Jonas Krautter, Amir Moradi, Mehdi B. Tahoori – IEEE Design & Test, Volume 37, Issue 2, April 2020.
2019
- A Comparison of χ²-Test and Mutual Information as Distinguisher for Side-Channel Analysis
Bastian Richter, David Knichel, Amir Moradi – 18th Smart Card Research and Advanced Application Conference, CARDIS 2019, Prague, Czech Republic, November 11-13, 2019. - Active Fences against Voltage-based Side Channels in Multi-Tenant FPGAs
Jonas Krautter, Dennis Gnad, Falk Schellenberg, Amir Moradi, Mehdi B. Tahoori – International Conference On Computer Aided Design, ICCAD 2019, Westminster, Colorado, USA, November 4-7, 2019. - Automated Probe Repositioning for On-Die EM Measurements
Bastian Richter, Alexander Wild, Amir Moradi – International Conference On Computer Aided Design, ICCAD 2019, Westminster, Colorado, USA, November 4-7, 2019. - Impeccable Circuits
Anita Aghaie, Amir Moradi, Shahram Rasoolzadeh, Aein Rezaei Shahmirzadi, Falk Schellenberg, Tobias Schneider – IEEE Transactions on Computers, 2019. - Static Power Side-Channel Analysis – An Investigation of Measurement Factors
Thorben Moos, Amir Moradi, Bastian Richter – IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 2019. - Exploring the Effect of Device Aging on Static Power Analysis Attacks
Naghmeh Karimi, Thorben Moos, Amir Moradi – IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2019, No. 3, pp 233-256, 2019. - Glitch-Resistant Masking Revisited or Why Proofs in the Robust Probing Model are Needed
Thorben Moos, Amir Moradi, Tobias Schneider, François-Xavier Standaert – IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2019, No. 2, pp 256-292, 2019. best paper award - Shuffle and Mix: On the Diffusion of Randomness in Threshold Implementations of Keccak
Felix Wegener, Christian Baiker, Amir Moradi – International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2019, Darmstadt, Germany, April 3-5, 2019. - CRAFT: Lightweight Tweakable Block Cipher with Efficient Protection Against DFA Attacks
Christof Beierle, Gregor Leander, Amir Moradi, Shahram Rasoolzadeh – IACR Transactions on Symmetric Cryptology, Vol. 2019, No. 1, pp 5-45, 2019.
- 2018
- Yet Another Size Record for AES: A First-Order SCA Secure AES S-box Based on GF(2^8) Multiplication
Felix Wegener, Amir Moradi – 17th Smart Card Research and Advanced Application Conference, CARDIS 2018, Montpellier, France, November 12-14, 2018. - Remote Inter-Chip Power Analysis Side-Channel Attacks at Board-Level
Falk Schellenberg, Dennis R.E. Gnad, Amir Moradi, Mehdi B. Tahoori – International Conference On Computer Aided Design, ICCAD 2018, San Diego, CA, USA, November 5-8, 2018. - Hardware Masking, Revisited
Thomas De Cnudde, Maik Ender, Amir Moradi – IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2018, No. 2, pp 123-148, 2018. - Leakage Detection with the χ²-Test
Amir Moradi, Bastian Richter, Tobias Schneider, François-Xavier Standaert – IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2018, No. 1, pp 209-237, 2018. - Spin Me Right Round – Rotational Symmetry for FPGA-Specific AES
Lauren De Meyer, Amir Moradi, Felix Wegener – IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2018, No. 3, pp 596-626, 2018. - Threshold Implementation in Software – Case Study of PRESENT
Pascal Sasdrich, Rene Bock, Amir Moradi – 9th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2018, Singapore, April 23-24, 2018. - A First-Order SCA Resistant AES without Fresh Randomness
Felix Wegener, Amir Moradi – International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2018, Singapore, April 23-24, 2018. - An Inside Job: Remote Power Analysis Attacks on FPGAs
Falk Schellenberg, Dennis R.E. Gnad, Amir Moradi, Mehdi B. Tahoori – Design, Automation & Test in Europe Conference & Exhibition, DATE 2018, Dresden, Germany, March 18 – 23 , 2018. best paper candidate. - Bitstream Fault Injections (BiFI) – Automated Fault Attacks against SRAM-based FPGAs
Pawel Swierczynski, Georg T. Becker, Amir Moradi, Christof Paar – IEEE Transactions on Computers, vol. 67, no. 3, pp. 348-360, 2018.GliFreD: Glitch-Free Duplication – Towards Power-Equalized Circuits on FPGAs
Alexander Wild, Amir Moradi, Tim Güneysu – IEEE Transactions on Computers, vol. 67, no. 3, pp. 375-387, 2018.
- 2017
- The First Thorough Side-Channel Hardware Trojan
Maik Ender, Samaneh Ghandali, Amir Moradi, Christof Paar – International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2017, Hong Kong, China, December 3 – 7, 2017. - Bit-Sliding: A Generic Technique for Bit-Serial Implementations of SPN-based Primitives
Jérémy Jean, Amir Moradi, Thomas Peyrin, Pascal Sasdrich – Workshop on Cryptographic Hardware and Embedded Systems, CHES 2017, Taipei, Taiwan, September 25 – 28, 2017. - On the Easiness of Turning Higher-Order Leakages into First-Order
Thorben Moos, Amir Moradi – 8th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2017, Paris, France, April 13-14, 2017. - SafeDRP: Yet Another Way Toward Power-Equalized Designs in FPGA
Maik Ender, Alexander Wild, Amir Moradi – International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2017, Paris, France, April 13-14, 2017. - SPARX – A Side-Channel Protected Processor for ARX-based Cryptography
Florian Bache, Tobias Schneider, Amir Moradi, Tim Güneysu – Design, Automation & Test in Europe Conference & Exhibition, DATE 2017, Lausanne, Switzerland, March 27 – 31 , 2017. - Static Power Side-Channel Analysis of a Threshold Implementation Prototype Chip
Thorben Moos, Amir Moradi, Bastian Richter – Design, Automation & Test in Europe Conference & Exhibition, DATE 2017, Lausanne, Switzerland, March 27 – 31 , 2017. best paper candidate. - Hiding Higher-Order Side-Channel Leakage – Randomizing Cryptographic Implementations in Reconfigurable Hardware
Pascal Sasdrich, Amir Moradi, Tim Güneysu – RSA Conference Cryptographers’ Track, CT-RSA 2017, San Francisco, February 14-17 2017.
- 2016
- Side-Channel Analysis Protection and Low-Latency in Action – case study of PRINCE and Midori
Amir Moradi, Tobias Schneider – International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2016, Hanoi, Vietnam, December 4 – 8, 2016. - Moments-Correlating DPA
Amir Moradi, François-Xavier Standaert – Theory of Implementation Security (TIs) Workshop (of ACM CCS 2016), Vienna, Austria, October 24, 2016. - Strong 8-bit Sboxes with Efficient Masking in Hardware
Erik Boss, Vincent Grosso, Tim Güneysu, Gregor Leander, Amir Moradi, Tobias Schneider – Workshop on Cryptographic Hardware and Embedded Systems, CHES 2016, Santa Barbara, California, USA, August 17 – 19, 2016. - ParTI – Towards Combined Hardware Countermeasures against Side-Channel and Fault-Injection Attacks
Tobias Schneider, Amir Moradi, Tim Güneysu – International Cryptology Conference – CRYPTO 2016, Santa Barbara, California, USA, August 14 – 18, 2016. - The SKINNY Family of Block Ciphers and its Low-Latency Variant MANTIS
Christof Beierle, Jérémy Jean, Stefan Kölbl, Gregor Leander, Amir Moradi, Thomas Peyrin, Yu Sasaki, Pascal Sasdrich, Siang Meng Sim – International Cryptology Conference – CRYPTO 2016, Santa Barbara, California, USA, August 14 – 18, 2016. - Bridging the Gap: Advanced Tools for Side-Channel Leakage Estimation beyond Gaussian Templates and Histograms
Tobias Schneider, Amir Moradi, François-Xavier Standaert, Tim Güneysu – 23nd International Conference on Selected Areas in Cryptography, SAC 2016, St. John’s, NL, Canada, August 10–12, 2016. - Interdiction in Practice – Hardware Trojan Against a High-Security USB Flash Drive
Pawel Swierczynski, Marc Fyrbiak, Philipp Koppe, Amir Moradi, Christof Paar – Journal of Cryptographic Engineering, Springer, June 2016. - Large Laser Spots and Fault Sensitivity Analysis
Falk Schellenberg, Markus Finkeldey, Nils C. Gerhardt, Martin R. Hofmann , Amir Moradi, Christof Paar – IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2016, McLean, VA, USA, May 3-5, 2016. best student-paper award. - Improved Side-Channel Analysis Attacks on Xilinx Bitstream Encryption of 5, 6, and 7 Series
Amir Moradi, Tobias Schneider – 7th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2016, Gray, Austria, April 14-15, 2016. - Robust and One-Pass Parallel Computation of Correlation-Based Attacks at Arbitrary Order
Tobias Schneider, Amir Moradi, Tim Güneysu – 7th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2016, Gray, Austria, April 14-15, 2016. - White-Box Cryptography in the Gray Box – A Hardware Implementation and its Side Channels
Pascal Sasdrich, Amir Moradi, Tim Güneysu – 23rd International Conference on Fast Software Encryption, FSE 2016, Bochum, Germany, March 20-23 2016. - Leakage Assessment Methodology – Extended Version
Tobias Schneider, Amir Moradi – Journal of Cryptographic Engineering June 2016, Volume 6, Issue 2, pp 85–99.
- 2015
- Assessment of Hiding the Higher-Order Leakages in Hardware – what are the achievements versus overheads?
Amir Moradi, Alexander Wild – Workshop on Cryptographic Hardware and Embedded Systems, CHES 2015, Saint-Malo, France, September 13 – 16, 2015. best paper candidate. - Leakage Assessment Methodology – a clear roadmap for side-channel evaluations
Tobias Schneider, Amir Moradi – Workshop on Cryptographic Hardware and Embedded Systems, CHES 2015, Saint-Malo, France, September 13 – 16, 2015. - Affine Equivalence and its Application to Tightening Threshold Implementations
Pascal Sasdrich, Amir Moradi, Tim Güneysu – 22nd International Conference on Selected Areas in Cryptography, SAC 2015, Mount Allison University Sackville, New Brunswick, Canada, August 12-14 2015. - Advances in Side-Channel Security
Amir Moradi – Habilitation Thesis, Ruhr University Bochum, Germany, 2015. - Arithmetic Addition over Boolean Masking – Towards First- and Second-Order Resistance in Hardware
Tobias Schneider, Amir Moradi, Tim Güneysu – International Conference on Applied Cryptography and Network Security – ACNS 2015, New York, USA, 2–5 June 2015. - Achieving Side-Channel Protection with Dynamic Logic Reconfiguration on Modern FPGAs
Pascal Sasdrich, Amir Moradi, Oliver Mischke, Tim Güneysu – IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2015, McLean, VA, USA, May 5-7, 2015. - A Hardware-based Countermeasure to Reduce Side-Channel Leakage – Design, Implementation, and Evaluation
Andreas Gornik, Amir Moradi, Jürgen Oehm, Christof Paar – IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, Vol. 34, No.8, pages 1308-1319, 2015. - Evaluating the Duplication of Dual-Rail Precharge Logics on FPGAs
Alexander Wild, Amir Moradi, Tim Güneysu – 6th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2015, Berlin, Germany, April 13-14, 2015. - Side-Channel Protection by Randomizing Look-Up Tables on Reconfigurable Hardware – Pitfalls of Memory Primitives
Pascal Sasdrich, Oliver Mischke, Amir Moradi, Tim Güneysu – 6th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2015, Berlin, Germany, April 13-14, 2015. - Side-Channel Security Analysis of Ultra-Low-Power FRAM-based MCUs
Amir Moradi, Gesine Hinterwälder – 6th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2015, Berlin, Germany, April 13-14, 2015. best paper award. - Side-Channel Attacks from Static Power: When Should we Care?
Santos Merino Del Pozo, François-Xavier Standaert, Dina Kamel, Amir Moradi – Design, Automation & Test in Europe Conference & Exhibition, DATE 2015, Grenoble, France, March 9 – 13 , 2015.
- 2014
- Wire-Tap Codes as Side-Channel Countermeasure – an FPGA-based experiment
Amir Moradi – 15th International Conference on Cryptology in India, Indocrypt 2014, New Delhi, December 14 – 17, 2014. - Physical Security Evaluation of the Bitstream Encryption Mechanism of Altera Stratix II and Stratix III FPGAs
Pawel Swierczynski, Amir Moradi, David Oswald, Christof Paar – ACM Transactions on Reconfigurable Technology and Systems (TRETS), Volume 7 Issue 4, December 2014. - Full-Size High-Security ECC Implementation on MSP430 Microcontrollers
Gesine Hinterwälder, Amir Moradi, Michael Hutter, Peter Schwabe, Christof Paar – Third International Conference on Cryptology and Information Security in Latin America, Latincrypt 2014, Florianópolis, Brazil, September 17 – 19, 2014. - Early Propagation and Imbalanced Routing, How to Diminish in FPGAs
Amir Moradi, Vincent Immler – Workshop on Cryptographic Hardware and Embedded Systems, CHES 2014, Busan, Korea, September 23 – 26, 2014. - Side-Channel Leakage through Static Power – Should We Care about in Practice?
Amir Moradi – Workshop on Cryptographic Hardware and Embedded Systems, CHES 2014, Busan, Korea, September 23 – 26, 2014. - Fault Sensitivity Analysis Meets Zero-Value Attack
Oliver Mischke, Amir Moradi, Tim Güneysu – Fault Diagnosis and Tolerance in Cryptography – FDTC 2014, Busan, Korea, September 23, 2013. - Detecting Hidden Leakages
Amir Moradi, Sylvain Guilley, Annelie Heuser – International Conference on Applied Cryptography and Network Security – ACNS 2014, Lausanne, Switzerland, June 10 – 13, 2014. best-paper award.
- 2013
- Comprehensive Evaluation of AES Dual Ciphers as a Side-Channel Countermeasure
Amir Moradi, Oliver Mischke – International Conference on Information and Communications Security, ICICS 2013, Beijing, China, November 20 – 22, 2013. - One Attack to Rule Them All: Collision Timing Attack versus 42 AES ASIC Cores
Amir Moradi, Oliver Mischke, Christof Paar – IEEE Transactions on Computers, vol. 62, no. 9, pp. 1786-1798, Sept. 2013. - On the Simplicity of Converting Leakages from Multivariate to Univariate – Case Study of a Glitch-Resistant Masking Scheme
Amir Moradi, Oliver Mischke – Workshop on Cryptographic Hardware and Embedded Systems, CHES 2013, Santa Barbara, California, USA, August 20 – 23, 2013. - Attacking Atmel’s CryptoMemory EEPROM with Special-Purpose Hardware
Alexander Wild, Tim Güneysu, Amir Moradi – Applied Cryptography and Network Security – 11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013. - Side-Channel Attacks on the Bitstream Encryption Mechanism of Altera Stratix II – Facilitating Black-Box Analysis using Software Reverse-Engineering
Amir Moradi, David Oswald, Christof Paar, Pawel Swierczynski – 21st ACM/SIGDA International Symposium on Field-Programmable Gate Arrays- FPGA 2013, pages 91-100, February 11 – 13. ACM, 2013.
- 2012
- Side Channels as Building Blocks
Markus Kasper, Amir Moradi, Georg T. Becker, Oliver Mischke, Tim Güneysu, Christof Paar, Wayne Burleson – Journal of Cryptographic Engineering, Volume 2, Number 3, pages 143-159, 2012, Springer. - How Far Should Theory be from Practice? – Evaluation of a Countermeasure
Amir Moradi, Oliver Mischke – Cryptographic Hardware and Embedded Systems – CHES 2012 – 14th International Workshop, Leuven, Belgium, September 9-12, 2012. - Glitch-Free Implementation of Masking in Modern FPGAs
Amir Moradi, Oliver Mischke – 2012 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2012, San Francisco, CA, USA, June 3-4, 2012. - Statistical Tools Flavor Side-Channel Collision Attacks
Amir Moradi – Advances in Cryptology – EUROCRYPT 2012 – 31th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, United Kingdom, April 15-19, 2012, pages 428-445. - Black-Box Side-Channel Attacks Highlight the Importance of Countermeasures – An Analysis of the Xilinx Virtex-4 and Virtex-5 Bitstream Encryption Mechanism
Amir Moradi, Markus Kasper, Christof Paar – Topics in Cryptology – CT-RSA 2012 – The Cryptographers‘ Track at the RSA Conference, San Francisco, CA, USA, February 27- March 2, 2012, pages 1-18.
- 2011
- Praktische Angriffe auf die Bitstromverschlüsselung von Xilinx FPGAs
Markus Kasper, Timo Kasper, Amir Moradi, Christof Paar – Datenschutz und Datensicherheit – DuD – Ausgabe 11/2011. - On the Vulnerability of FPGA Bitstream Encryption against Power Analysis Attacks – Extracting Keys from Xilinx Virtex-II FPGAs
Amir Moradi, Alessandro Barenghi, Timo Kasper, Christof Paar – 18th ACM Conference on Computer and Communications Security, CCS 2011, Chicago, IL, USA, October 17-21, 2011, pages 111-124. - Generic Side-Channel Countermeasures for Reconfigurable Devices
Tim Güneysu, Amir Moradi – Cryptographic Hardware and Embedded Systems – CHES 2011 – 13th International Workshop, Nara, Japan, September 28 – October 1, 2011. - On the Power of Fault Sensitivity Analysis and Collision Side-Channel Attacks in a Combined Setting
Amir Moradi, Oliver Mischke, Christof Paar, Yang Li, Kazuo Ohta, Kazuo Sakiyama – Cryptographic Hardware and Embedded Systems – CHES 2011 – 13th International Workshop, Nara, Japan, September 28 – October 1, 2011. - Masked Dual-Rail Precharge Logic Encounters State-of-the-Art Power Analysis Methods
Amir Moradi, Mario Kirschbaum, Thomas Eisenbarth, Christof Paar – IEEE Transactions on Very Large Scale Integration Systems, Volume 20 , Issue 9, Pages 1578 – 1589, 2012. - Practical Evaluation of DPA Countermeasures on Reconfigurable Hardware
Amir Moradi, Oliver Mischke, Christof Paar – HOST 2011, Proceedings of the 2011 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), 5-6 June 2011, San Diego, California, USA. - Pushing the Limits: A Very Compact and a Threshold Implementation of AES
Amir Moradi, Dipl.-Kfm. Axel Poschmann, San Ling, Christof Paar, Huaxiong Wang – Advances in Cryptology – EUROCRYPT 2011 – 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011, volume 6632 of LNCS, pages 69-88, Springer. - Side-Channel Resistant Crypto for less than 2,300 GE
Axel Poschmann, Amir Moradi, Khoongming Khoo, Chu-Wee Lim, Huaxiong Wang, San Ling – Journal of Cryptology, Special Issue on Hardware and Security, Volume 24, Number 2, pages 322-345, April 2011.
- 2010
- Side-channel based watermarks for IP Protection
Georg T. Becker, Markus Kasper, Amir Moradi, Christof Paar – COSADE 2010 – First International Workshop on Constructive Side-Channel Analysis and Secure Design. - Correlation-Enhanced Power Analysis Collision Attack
Amir Moradi, Oliver Mischke, Thomas Eisenbarth – Cryptographic Hardware and Embedded Systems, CHES 2010, 12th International Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings - Side-channel based watermarks for integrated circuits
Georg T. Becker, Markus Kasper, Amir Moradi, Christof Paar – IEEE International Symposium on Hardware-Oriented Security and Trust (HOST 2010), AnaheimCA , USA, 13-14 June 2010. - Practical Power Analysis Attacks on Software Implementations of McEliece
Stefan Heyse, Amir Moradi, Christof Paar – Post-Quantum Cryptography, Third International Workshop, PQCrypto 2010, Darmstadt, Germany, May 25-28, 2010. Proceedings - Lightweight Cryptography and DPA Countermeasures: A Survey
Amir Moradi, Axel Poschmann – First International Workshop on Lightweight Cryptography for Resource-Constrained Devices, WLC 2010 (co-located with Financial Cryptography and Data Security – FC 2010), Tenerife, Canary Islands, Spain, Januar 25-28, 2010.
- A New Remote Keyless Entry System Resistant to Power Analysis Attacks
Amir Moradi, Timo Kasper – 7th International Conference on Information, Communications and Signal Processing, ICICS 2009, Macau, China, December 7-10, 2009. - Power Analysis of Single-Rail Storage Elements as used in MDPL
Amir Moradi, Thomas Eisenbarth, Dipl.-Kfm. Axel Poschmann, Christof Paar – 12th International Conference on Information Security and Cryptology – ICISC 2009, Seoul, Korea, December 2-4, 2009. - KeeLoq and Side-Channel Analysis – Evolution of an Attack
Christof Paar, Thomas Eisenbarth, Markus Kasper, Timo Kasper, Amir Moradi – 6th IEEE Workshop on Fault Diagnosis and Tolerance in Cryptography – FDTC 2009.Lausanne, Switzerland, September 6, 2009. - A Comparative Study of Mutual Information Analysis under a Gaussian Assumption
Amir Moradi, Nima Mousavi, Christof Paar, Mahmoud Salmasizadeh – 10th International Workshop on Information Security Applications, WISA 2009, Busan, Korea. August 25-27, 2009. - Breaking KeeLoq in a Flash: On Extracting Keys at Lightning Speed
Markus Kasper, Timo Kasper, Amir Moradi, Christof Paar – 2nd International Conference on Cryptology in Africa, Progress in Cryptology – AFRICACRYPT 2009, Gammarth, Tunisia, 21-25 Juni, 2009. - Dual-rail transition logic: A logic style for counteracting power analysis attacks
Amir Moradi, Mohammad Taghi Manzuri Shalmani, Mahmoud Salmasizadeh, Computers & Electrical Engineering, Volume 35, Issue 2, Pages 359-369, 2009. - Vulnerability modeling of cryptographic hardware to power analysis attacks
Amir Moradi, Mahmoud Salmasizadeh, Mohammad T. Manzuri Shalmani, Thomas Eisenbarth, Integration, Volume 42, Issue 4, Pages 468-478, 2009. - Charge recovery logic as a side channel attack countermeasure
Amir Moradi, Mehrdad Khatir, Mahmoud Salmasizadeh, Mohammad T. Manzuri Shalmani, 10th International Symposium on Quality Electronic Design (ISQED), pp. 686-691, 2009. - A Comparative Study of Mutual Information Analysis under a Gaussian Assumption
Amir Moradi, Nima Mousavi, Christof Paar, Mahmoud Salmasizadeh, Information Security Applications, 10th International Workshop (WISA), Lecture Notes in Computer Science, vol 5932., pp. 193-205, 2009.
- A New Remote Keyless Entry System Resistant to Power Analysis Attacks
- 2008
- On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoq Code Hopping Scheme
Thomas Eisenbarth, Timo Kasper, Amir Moradi, Christof Paar, Mahmoud Salmasizadeh, Mohammad T. Manzuri Shalmani – 28th International Cryptology Conference — CRYPTO 2008. Santa Barbara, California, USA. August 17-21, 2008. - Susceptibility of eSTREAM Candidates towards Side Channel Analysis
Benedikt Gierlichs, Lejla Batina, Christophe Clavier, Thomas Eisenbarth, Aline Gouget, Helena Handschuh, Timo Kasper, Kerstin Lemke-Rust, Stefan Mangard, Amir Moradi, Elisabeth Oswald – The State of the Art of Stream Ciphers, SASC 2008, Lausanne, Switzerland. Februar, 13-14 2008. - On the Importance of the Number of Fanouts to Prevent the Glitches in DPA-Resistant Devices
Amir Moradi, Mahmoud Salmasizadeh, Mohammad Taghi Manzuri Shalmani, Advances in Computer Science and Engineering. CSICC 2008. Communications in Computer and Information Science, vol 6., pp. 661-670, 2008. - A secure and low-energy logic style using charge recovery approach
Mehrdad Khatir, Amir Moradi, Alireza Ejlali, Mohammad T. Manzuri Shalmani, Mahmoud Salmasizadeh, international symposium on Low Power Electronics & Design (ISLPED ’08). Association for Computing Machinery, pp. 259-264, 2008.
- On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoq Code Hopping Scheme
- 2007
- Compact and Secure Design of Masked AES S-Box
Babak Zakeri, Mahmoud Salmasizadeh, Amir Moradi, Mahmoud Tabandeh, Mohammad T. Manzuri Shalmani, Information and Communications Security. ICICS 2007. Lecture Notes in Computer Science, vol 4861, pp. 216-229, 2007. - Power Analysis Attacks on MDPL and DRSL Implementations
Amir Moradi, Mahmoud Salmasizadeh, Mohammad T. Manzuri Shalmani, Information Security and Cryptology – ICISC 2007. Lecture Notes in Computer Science, vol 4817, pp. 259-272, 2007.
- Compact and Secure Design of Masked AES S-Box
- 2006
- A Generalized Method of Differential Fault Attack Against AES Cryptosystem
Amir Moradi, Mohammad T. Manzuri Shalmani, Mahmoud Salmasizadeh, Cryptographic Hardware and Embedded Systems – CHES 2006. Lecture Notes in Computer Science, vol 4249, pp. 91-100, 2006.
- A Generalized Method of Differential Fault Attack Against AES Cryptosystem