[{"publisher":"Heinz Nixdorf Institut, Universität Paderborn","date_updated":"2024-07-12T12:06:11Z","date_created":"2021-11-17T10:49:13Z","volume":"Band 400","title":"Vorausschau und Technologieplanung - 16. Symposium für Vorausschau und Technologieplanung","publication_status":"published","place":"Paderborn","year":"2021","citation":{"short":"J. Gausemeier, W. Bauer, R. Dumitrescu, eds., Vorausschau und Technologieplanung - 16. Symposium für Vorausschau und Technologieplanung, Heinz Nixdorf Institut, Universität Paderborn, Paderborn, 2021.","bibtex":"@book{Gausemeier_Bauer_Dumitrescu_2021, place={Paderborn}, title={Vorausschau und Technologieplanung - 16. Symposium für Vorausschau und Technologieplanung}, volume={Band 400}, publisher={Heinz Nixdorf Institut, Universität Paderborn}, year={2021} }","mla":"Gausemeier, Jürgen, et al., editors. <i>Vorausschau und Technologieplanung - 16. Symposium für Vorausschau und Technologieplanung</i>. Heinz Nixdorf Institut, Universität Paderborn, 2021.","apa":"Gausemeier, J., Bauer, W., &#38; Dumitrescu, R. (Eds.). (2021). <i>Vorausschau und Technologieplanung - 16. Symposium für Vorausschau und Technologieplanung: Vol. Band 400</i>. Heinz Nixdorf Institut, Universität Paderborn.","ama":"Gausemeier J, Bauer W, Dumitrescu R, eds. <i>Vorausschau und Technologieplanung - 16. Symposium für Vorausschau und Technologieplanung</i>. Vol Band 400. Heinz Nixdorf Institut, Universität Paderborn; 2021.","chicago":"Gausemeier, Jürgen, Wilhelm Bauer, and Roman Dumitrescu, eds. <i>Vorausschau und Technologieplanung - 16. Symposium für Vorausschau und Technologieplanung</i>. Vol. Band 400. Paderborn: Heinz Nixdorf Institut, Universität Paderborn, 2021.","ieee":"J. Gausemeier, W. Bauer, and R. Dumitrescu, Eds., <i>Vorausschau und Technologieplanung - 16. Symposium für Vorausschau und Technologieplanung</i>, vol. Band 400. Paderborn: Heinz Nixdorf Institut, Universität Paderborn, 2021."},"_id":"27519","user_id":"1112","department":[{"_id":"563"},{"_id":"26"}],"language":[{"iso":"ger"}],"type":"conference_editor","editor":[{"last_name":"Gausemeier","id":"163","full_name":"Gausemeier, Jürgen","first_name":"Jürgen"},{"last_name":"Bauer","full_name":"Bauer, Wilhelm","first_name":"Wilhelm"},{"first_name":"Roman","last_name":"Dumitrescu","id":"16190","full_name":"Dumitrescu, Roman"}],"status":"public"},{"oa":"1","date_updated":"2024-09-05T12:01:29Z","volume":41,"author":[{"first_name":"Lukas","full_name":"Höper, Lukas","id":"58041","last_name":"Höper"},{"id":"58465","full_name":"Hüsing, Sven","last_name":"Hüsing","first_name":"Sven"},{"last_name":"Malatyali","id":"4076","full_name":"Malatyali, Hülya","first_name":"Hülya"},{"first_name":"Carsten","last_name":"Schulte","full_name":"Schulte, Carsten","id":"60311"},{"first_name":"Lea","last_name":"Budde","full_name":"Budde, Lea","id":"32443"}],"intvolume":"        41","page":"31-38","citation":{"apa":"Höper, L., Hüsing, S., Malatyali, H., Schulte, C., &#38; Budde, L. (2021). Methodik für Datenprojekte im Informatikunterricht. <i>LOG IN</i>, <i>41</i>(1), 31–38.","bibtex":"@article{Höper_Hüsing_Malatyali_Schulte_Budde_2021, title={Methodik für Datenprojekte im Informatikunterricht}, volume={41}, number={1}, journal={LOG IN}, publisher={LOG IN Verlag}, author={Höper, Lukas and Hüsing, Sven and Malatyali, Hülya and Schulte, Carsten and Budde, Lea}, year={2021}, pages={31–38} }","mla":"Höper, Lukas, et al. “Methodik Für Datenprojekte Im Informatikunterricht.” <i>LOG IN</i>, vol. 41, no. 1, LOG IN Verlag, 2021, pp. 31–38.","short":"L. Höper, S. Hüsing, H. Malatyali, C. Schulte, L. Budde, LOG IN 41 (2021) 31–38.","chicago":"Höper, Lukas, Sven Hüsing, Hülya Malatyali, Carsten Schulte, and Lea Budde. “Methodik Für Datenprojekte Im Informatikunterricht.” <i>LOG IN</i> 41, no. 1 (2021): 31–38.","ieee":"L. Höper, S. Hüsing, H. Malatyali, C. Schulte, and L. Budde, “Methodik für Datenprojekte im Informatikunterricht,” <i>LOG IN</i>, vol. 41, no. 1, pp. 31–38, 2021.","ama":"Höper L, Hüsing S, Malatyali H, Schulte C, Budde L. Methodik für Datenprojekte im Informatikunterricht. <i>LOG IN</i>. 2021;41(1):31-38."},"has_accepted_license":"1","file_date_updated":"2024-09-05T12:01:29Z","_id":"29702","department":[{"_id":"67"}],"user_id":"58041","status":"public","type":"journal_article","title":"Methodik für Datenprojekte im Informatikunterricht","publisher":"LOG IN Verlag","date_created":"2022-01-31T12:18:52Z","year":"2021","issue":"1","ddc":["370"],"language":[{"iso":"eng"}],"file":[{"date_created":"2024-09-05T11:58:59Z","creator":"hoeper","date_updated":"2024-09-05T12:01:29Z","file_name":"Höper et al_2021_Methodik für Datenprojekte im Informatikunterricht.pdf","access_level":"open_access","file_id":"56076","file_size":179106,"content_type":"application/pdf","relation":"main_file"}],"publication":"LOG IN"},{"type":"conference","publication":"International IEEE Joint Conference on Biometrics, IJCB 2021, Shenzhen, China, August 4-7, 2021","status":"public","_id":"34715","user_id":"14931","department":[{"_id":"761"}],"extern":"1","language":[{"iso":"eng"}],"year":"2021","citation":{"ama":"Terhörst P, Boller A, Damer N, Kirchbuchner F, Kuijper A. MiDeCon: Unsupervised and Accurate Fingerprint and Minutia Quality Assessment based on Minutia Detection Confidence. In: <i>International IEEE Joint Conference on Biometrics, IJCB 2021, Shenzhen, China, August 4-7, 2021</i>. IEEE; 2021:1–8. doi:<a href=\"https://doi.org/10.1109/IJCB52358.2021.9484404\">10.1109/IJCB52358.2021.9484404</a>","ieee":"P. Terhörst, A. Boller, N. Damer, F. Kirchbuchner, and A. Kuijper, “MiDeCon: Unsupervised and Accurate Fingerprint and Minutia Quality Assessment based on Minutia Detection Confidence,” in <i>International IEEE Joint Conference on Biometrics, IJCB 2021, Shenzhen, China, August 4-7, 2021</i>, 2021, pp. 1–8, doi: <a href=\"https://doi.org/10.1109/IJCB52358.2021.9484404\">10.1109/IJCB52358.2021.9484404</a>.","chicago":"Terhörst, Philipp, André Boller, Naser Damer, Florian Kirchbuchner, and Arjan Kuijper. “MiDeCon: Unsupervised and Accurate Fingerprint and Minutia Quality Assessment Based on Minutia Detection Confidence.” In <i>International IEEE Joint Conference on Biometrics, IJCB 2021, Shenzhen, China, August 4-7, 2021</i>, 1–8. IEEE, 2021. <a href=\"https://doi.org/10.1109/IJCB52358.2021.9484404\">https://doi.org/10.1109/IJCB52358.2021.9484404</a>.","short":"P. Terhörst, A. Boller, N. Damer, F. Kirchbuchner, A. Kuijper, in: International IEEE Joint Conference on Biometrics, IJCB 2021, Shenzhen, China, August 4-7, 2021, IEEE, 2021, pp. 1–8.","mla":"Terhörst, Philipp, et al. “MiDeCon: Unsupervised and Accurate Fingerprint and Minutia Quality Assessment Based on Minutia Detection Confidence.” <i>International IEEE Joint Conference on Biometrics, IJCB 2021, Shenzhen, China, August 4-7, 2021</i>, IEEE, 2021, pp. 1–8, doi:<a href=\"https://doi.org/10.1109/IJCB52358.2021.9484404\">10.1109/IJCB52358.2021.9484404</a>.","bibtex":"@inproceedings{Terhörst_Boller_Damer_Kirchbuchner_Kuijper_2021, title={MiDeCon: Unsupervised and Accurate Fingerprint and Minutia Quality Assessment based on Minutia Detection Confidence}, DOI={<a href=\"https://doi.org/10.1109/IJCB52358.2021.9484404\">10.1109/IJCB52358.2021.9484404</a>}, booktitle={International IEEE Joint Conference on Biometrics, IJCB 2021, Shenzhen, China, August 4-7, 2021}, publisher={IEEE}, author={Terhörst, Philipp and Boller, André and Damer, Naser and Kirchbuchner, Florian and Kuijper, Arjan}, year={2021}, pages={1–8} }","apa":"Terhörst, P., Boller, A., Damer, N., Kirchbuchner, F., &#38; Kuijper, A. (2021). MiDeCon: Unsupervised and Accurate Fingerprint and Minutia Quality Assessment based on Minutia Detection Confidence. <i>International IEEE Joint Conference on Biometrics, IJCB 2021, Shenzhen, China, August 4-7, 2021</i>, 1–8. <a href=\"https://doi.org/10.1109/IJCB52358.2021.9484404\">https://doi.org/10.1109/IJCB52358.2021.9484404</a>"},"page":"1–8","date_updated":"2023-01-17T09:16:48Z","publisher":"IEEE","author":[{"first_name":"Philipp","last_name":"Terhörst","id":"97123","full_name":"Terhörst, Philipp"},{"full_name":"Boller, André","last_name":"Boller","first_name":"André"},{"last_name":"Damer","full_name":"Damer, Naser","first_name":"Naser"},{"first_name":"Florian","last_name":"Kirchbuchner","full_name":"Kirchbuchner, Florian"},{"first_name":"Arjan","full_name":"Kuijper, Arjan","last_name":"Kuijper"}],"date_created":"2022-12-21T12:29:19Z","title":"MiDeCon: Unsupervised and Accurate Fingerprint and Minutia Quality Assessment based on Minutia Detection Confidence","doi":"10.1109/IJCB52358.2021.9484404"},{"extern":"1","language":[{"iso":"eng"}],"_id":"34714","department":[{"_id":"761"}],"user_id":"14931","status":"public","publication":"IEEE Trans. Inf. Forensics Secur.","type":"journal_article","title":"Privacy-Enhancing Face Biometrics: A Comprehensive Survey","doi":"10.1109/TIFS.2021.3096024","date_updated":"2023-01-17T09:17:45Z","volume":16,"author":[{"full_name":"Meden, Blaz","last_name":"Meden","first_name":"Blaz"},{"first_name":"Peter","last_name":"Rot","full_name":"Rot, Peter"},{"first_name":"Philipp","last_name":"Terhörst","full_name":"Terhörst, Philipp","id":"97123"},{"last_name":"Damer","full_name":"Damer, Naser","first_name":"Naser"},{"first_name":"Arjan","full_name":"Kuijper, Arjan","last_name":"Kuijper"},{"full_name":"Scheirer, Walter J.","last_name":"Scheirer","first_name":"Walter J."},{"last_name":"Ross","full_name":"Ross, Arun","first_name":"Arun"},{"last_name":"Peer","full_name":"Peer, Peter","first_name":"Peter"},{"first_name":"Vitomir","full_name":"Struc, Vitomir","last_name":"Struc"}],"date_created":"2022-12-21T12:28:53Z","year":"2021","intvolume":"        16","page":"4147–4183","citation":{"apa":"Meden, B., Rot, P., Terhörst, P., Damer, N., Kuijper, A., Scheirer, W. J., Ross, A., Peer, P., &#38; Struc, V. (2021). Privacy-Enhancing Face Biometrics: A Comprehensive Survey. <i>IEEE Trans. Inf. Forensics Secur.</i>, <i>16</i>, 4147–4183. <a href=\"https://doi.org/10.1109/TIFS.2021.3096024\">https://doi.org/10.1109/TIFS.2021.3096024</a>","short":"B. Meden, P. Rot, P. Terhörst, N. Damer, A. Kuijper, W.J. Scheirer, A. Ross, P. Peer, V. Struc, IEEE Trans. Inf. Forensics Secur. 16 (2021) 4147–4183.","bibtex":"@article{Meden_Rot_Terhörst_Damer_Kuijper_Scheirer_Ross_Peer_Struc_2021, title={Privacy-Enhancing Face Biometrics: A Comprehensive Survey}, volume={16}, DOI={<a href=\"https://doi.org/10.1109/TIFS.2021.3096024\">10.1109/TIFS.2021.3096024</a>}, journal={IEEE Trans. Inf. Forensics Secur.}, author={Meden, Blaz and Rot, Peter and Terhörst, Philipp and Damer, Naser and Kuijper, Arjan and Scheirer, Walter J. and Ross, Arun and Peer, Peter and Struc, Vitomir}, year={2021}, pages={4147–4183} }","mla":"Meden, Blaz, et al. “Privacy-Enhancing Face Biometrics: A Comprehensive Survey.” <i>IEEE Trans. Inf. Forensics Secur.</i>, vol. 16, 2021, pp. 4147–4183, doi:<a href=\"https://doi.org/10.1109/TIFS.2021.3096024\">10.1109/TIFS.2021.3096024</a>.","chicago":"Meden, Blaz, Peter Rot, Philipp Terhörst, Naser Damer, Arjan Kuijper, Walter J. Scheirer, Arun Ross, Peter Peer, and Vitomir Struc. “Privacy-Enhancing Face Biometrics: A Comprehensive Survey.” <i>IEEE Trans. Inf. Forensics Secur.</i> 16 (2021): 4147–4183. <a href=\"https://doi.org/10.1109/TIFS.2021.3096024\">https://doi.org/10.1109/TIFS.2021.3096024</a>.","ieee":"B. Meden <i>et al.</i>, “Privacy-Enhancing Face Biometrics: A Comprehensive Survey,” <i>IEEE Trans. Inf. Forensics Secur.</i>, vol. 16, pp. 4147–4183, 2021, doi: <a href=\"https://doi.org/10.1109/TIFS.2021.3096024\">10.1109/TIFS.2021.3096024</a>.","ama":"Meden B, Rot P, Terhörst P, et al. Privacy-Enhancing Face Biometrics: A Comprehensive Survey. <i>IEEE Trans Inf Forensics Secur</i>. 2021;16:4147–4183. doi:<a href=\"https://doi.org/10.1109/TIFS.2021.3096024\">10.1109/TIFS.2021.3096024</a>"}},{"status":"public","publication":"IEEE Trans. Inf. Forensics Secur.","type":"journal_article","extern":"1","language":[{"iso":"eng"}],"department":[{"_id":"761"}],"user_id":"14931","_id":"34713","intvolume":"        16","page":"3942–3957","citation":{"ieee":"P. Terhörst, D. Fährmann, J. N. Kolf, N. Damer, F. Kirchbuchner, and A. Kuijper, “MAAD-Face: A Massively Annotated Attribute Dataset for Face Images,” <i>IEEE Trans. Inf. Forensics Secur.</i>, vol. 16, pp. 3942–3957, 2021, doi: <a href=\"https://doi.org/10.1109/TIFS.2021.3096120\">10.1109/TIFS.2021.3096120</a>.","chicago":"Terhörst, Philipp, Daniel Fährmann, Jan Niklas Kolf, Naser Damer, Florian Kirchbuchner, and Arjan Kuijper. “MAAD-Face: A Massively Annotated Attribute Dataset for Face Images.” <i>IEEE Trans. Inf. Forensics Secur.</i> 16 (2021): 3942–3957. <a href=\"https://doi.org/10.1109/TIFS.2021.3096120\">https://doi.org/10.1109/TIFS.2021.3096120</a>.","mla":"Terhörst, Philipp, et al. “MAAD-Face: A Massively Annotated Attribute Dataset for Face Images.” <i>IEEE Trans. Inf. Forensics Secur.</i>, vol. 16, 2021, pp. 3942–3957, doi:<a href=\"https://doi.org/10.1109/TIFS.2021.3096120\">10.1109/TIFS.2021.3096120</a>.","bibtex":"@article{Terhörst_Fährmann_Kolf_Damer_Kirchbuchner_Kuijper_2021, title={MAAD-Face: A Massively Annotated Attribute Dataset for Face Images}, volume={16}, DOI={<a href=\"https://doi.org/10.1109/TIFS.2021.3096120\">10.1109/TIFS.2021.3096120</a>}, journal={IEEE Trans. Inf. Forensics Secur.}, author={Terhörst, Philipp and Fährmann, Daniel and Kolf, Jan Niklas and Damer, Naser and Kirchbuchner, Florian and Kuijper, Arjan}, year={2021}, pages={3942–3957} }","short":"P. Terhörst, D. Fährmann, J.N. Kolf, N. Damer, F. Kirchbuchner, A. Kuijper, IEEE Trans. Inf. Forensics Secur. 16 (2021) 3942–3957.","apa":"Terhörst, P., Fährmann, D., Kolf, J. N., Damer, N., Kirchbuchner, F., &#38; Kuijper, A. (2021). MAAD-Face: A Massively Annotated Attribute Dataset for Face Images. <i>IEEE Trans. Inf. Forensics Secur.</i>, <i>16</i>, 3942–3957. <a href=\"https://doi.org/10.1109/TIFS.2021.3096120\">https://doi.org/10.1109/TIFS.2021.3096120</a>","ama":"Terhörst P, Fährmann D, Kolf JN, Damer N, Kirchbuchner F, Kuijper A. MAAD-Face: A Massively Annotated Attribute Dataset for Face Images. <i>IEEE Trans Inf Forensics Secur</i>. 2021;16:3942–3957. doi:<a href=\"https://doi.org/10.1109/TIFS.2021.3096120\">10.1109/TIFS.2021.3096120</a>"},"year":"2021","doi":"10.1109/TIFS.2021.3096120","title":"MAAD-Face: A Massively Annotated Attribute Dataset for Face Images","volume":16,"author":[{"full_name":"Terhörst, Philipp","id":"97123","last_name":"Terhörst","first_name":"Philipp"},{"first_name":"Daniel","last_name":"Fährmann","full_name":"Fährmann, Daniel"},{"first_name":"Jan Niklas","last_name":"Kolf","full_name":"Kolf, Jan Niklas"},{"full_name":"Damer, Naser","last_name":"Damer","first_name":"Naser"},{"first_name":"Florian","last_name":"Kirchbuchner","full_name":"Kirchbuchner, Florian"},{"first_name":"Arjan","full_name":"Kuijper, Arjan","last_name":"Kuijper"}],"date_created":"2022-12-21T12:28:31Z","date_updated":"2023-01-17T09:18:08Z"},{"citation":{"ama":"Terhörst P. <i>Mitigating Soft-Biometric Driven Bias and Privacy Concerns in Face Recognition Systems</i>. Technical University of Darmstadt, Germany; 2021.","ieee":"P. Terhörst, <i>Mitigating Soft-Biometric Driven Bias and Privacy Concerns in Face Recognition Systems</i>. Technical University of Darmstadt, Germany, 2021.","chicago":"Terhörst, Philipp. <i>Mitigating Soft-Biometric Driven Bias and Privacy Concerns in Face Recognition Systems</i>. Technical University of Darmstadt, Germany, 2021.","apa":"Terhörst, P. (2021). <i>Mitigating Soft-Biometric Driven Bias and Privacy Concerns in Face Recognition Systems</i>. Technical University of Darmstadt, Germany.","mla":"Terhörst, Philipp. <i>Mitigating Soft-Biometric Driven Bias and Privacy Concerns in Face Recognition Systems</i>. Technical University of Darmstadt, Germany, 2021.","bibtex":"@book{Terhörst_2021, title={Mitigating Soft-Biometric Driven Bias and Privacy Concerns in Face Recognition Systems}, publisher={Technical University of Darmstadt, Germany}, author={Terhörst, Philipp}, year={2021} }","short":"P. Terhörst, Mitigating Soft-Biometric Driven Bias and Privacy Concerns in Face Recognition Systems, Technical University of Darmstadt, Germany, 2021."},"year":"2021","title":"Mitigating Soft-Biometric Driven Bias and Privacy Concerns in Face Recognition Systems","date_created":"2022-12-21T12:27:11Z","author":[{"first_name":"Philipp","full_name":"Terhörst, Philipp","id":"97123","last_name":"Terhörst"}],"publisher":"Technical University of Darmstadt, Germany","date_updated":"2023-01-17T09:19:22Z","status":"public","type":"dissertation","extern":"1","language":[{"iso":"eng"}],"department":[{"_id":"761"}],"user_id":"14931","_id":"34711"},{"date_updated":"2023-01-17T09:24:45Z","volume":3,"author":[{"first_name":"Philipp","last_name":"Terhörst","id":"97123","full_name":"Terhörst, Philipp"},{"full_name":"Fährmann, Daniel","last_name":"Fährmann","first_name":"Daniel"},{"last_name":"Damer","full_name":"Damer, Naser","first_name":"Naser"},{"first_name":"Florian","full_name":"Kirchbuchner, Florian","last_name":"Kirchbuchner"},{"last_name":"Kuijper","full_name":"Kuijper, Arjan","first_name":"Arjan"}],"date_created":"2022-12-21T12:28:03Z","title":"On Soft-Biometric Information Stored in Biometric Face Embeddings","doi":"10.1109/TBIOM.2021.3093920","issue":"4","year":"2021","intvolume":"         3","page":"519–534","citation":{"mla":"Terhörst, Philipp, et al. “On Soft-Biometric Information Stored in Biometric Face Embeddings.” <i>IEEE Trans. Biom. Behav. Identity Sci.</i>, vol. 3, no. 4, 2021, pp. 519–534, doi:<a href=\"https://doi.org/10.1109/TBIOM.2021.3093920\">10.1109/TBIOM.2021.3093920</a>.","bibtex":"@article{Terhörst_Fährmann_Damer_Kirchbuchner_Kuijper_2021, title={On Soft-Biometric Information Stored in Biometric Face Embeddings}, volume={3}, DOI={<a href=\"https://doi.org/10.1109/TBIOM.2021.3093920\">10.1109/TBIOM.2021.3093920</a>}, number={4}, journal={IEEE Trans. Biom. Behav. Identity Sci.}, author={Terhörst, Philipp and Fährmann, Daniel and Damer, Naser and Kirchbuchner, Florian and Kuijper, Arjan}, year={2021}, pages={519–534} }","short":"P. Terhörst, D. Fährmann, N. Damer, F. Kirchbuchner, A. Kuijper, IEEE Trans. Biom. Behav. Identity Sci. 3 (2021) 519–534.","apa":"Terhörst, P., Fährmann, D., Damer, N., Kirchbuchner, F., &#38; Kuijper, A. (2021). On Soft-Biometric Information Stored in Biometric Face Embeddings. <i>IEEE Trans. Biom. Behav. Identity Sci.</i>, <i>3</i>(4), 519–534. <a href=\"https://doi.org/10.1109/TBIOM.2021.3093920\">https://doi.org/10.1109/TBIOM.2021.3093920</a>","ama":"Terhörst P, Fährmann D, Damer N, Kirchbuchner F, Kuijper A. On Soft-Biometric Information Stored in Biometric Face Embeddings. <i>IEEE Trans Biom Behav Identity Sci</i>. 2021;3(4):519–534. doi:<a href=\"https://doi.org/10.1109/TBIOM.2021.3093920\">10.1109/TBIOM.2021.3093920</a>","ieee":"P. Terhörst, D. Fährmann, N. Damer, F. Kirchbuchner, and A. Kuijper, “On Soft-Biometric Information Stored in Biometric Face Embeddings,” <i>IEEE Trans. Biom. Behav. Identity Sci.</i>, vol. 3, no. 4, pp. 519–534, 2021, doi: <a href=\"https://doi.org/10.1109/TBIOM.2021.3093920\">10.1109/TBIOM.2021.3093920</a>.","chicago":"Terhörst, Philipp, Daniel Fährmann, Naser Damer, Florian Kirchbuchner, and Arjan Kuijper. “On Soft-Biometric Information Stored in Biometric Face Embeddings.” <i>IEEE Trans. Biom. Behav. Identity Sci.</i> 3, no. 4 (2021): 519–534. <a href=\"https://doi.org/10.1109/TBIOM.2021.3093920\">https://doi.org/10.1109/TBIOM.2021.3093920</a>."},"_id":"34712","department":[{"_id":"761"}],"user_id":"14931","extern":"1","language":[{"iso":"eng"}],"publication":"IEEE Trans. Biom. Behav. Identity Sci.","type":"journal_article","status":"public"},{"keyword":["Software Analysis","Abstract Interpretation","Custom Instruction","Hardware Verification"],"funded_apc":"1","language":[{"iso":"eng"}],"_id":"27841","project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Project Area B","_id":"3"},{"name":"SFB 901 - Subproject B4","_id":"12"}],"department":[{"_id":"78"}],"user_id":"22398","abstract":[{"lang":"eng","text":"Verification of software and processor hardware usually proceeds separately, software analysis relying on the correctness of processors executing machine instructions. This assumption is valid as long as the software runs on standard CPUs that have been extensively validated and are in wide use. However, for processors exploiting custom instruction set extensions to meet performance and energy constraints the validation might be less extensive, challenging the correctness assumption. In this paper we present a novel formal approach for hardware/software co-verification targeting processors with custom instruction set extensions. We detail two different approaches for checking whether the hardware fulfills the requirements expected by the software analysis. The approaches are designed to explore a trade-off between generality of the verification and computational effort. Then, we describe the integration of software and hardware analyses for both techniques and describe a fully automated tool chain implementing the approaches. Finally, we demonstrate and compare the two approaches on example source code with custom instructions, using state-of-the-art software analysis and hardware verification techniques."}],"status":"public","publication":"IEEE Access","type":"journal_article","title":"Software/Hardware Co-Verification for Custom Instruction Set Processors","doi":"10.1109/ACCESS.2021.3131213","publisher":"IEEE","date_updated":"2023-01-18T08:34:50Z","author":[{"last_name":"Jakobs","full_name":"Jakobs, Marie-Christine","first_name":"Marie-Christine"},{"last_name":"Pauck","full_name":"Pauck, Felix","id":"22398","first_name":"Felix"},{"last_name":"Platzner","id":"398","full_name":"Platzner, Marco","first_name":"Marco"},{"last_name":"Wehrheim","full_name":"Wehrheim, Heike","id":"573","first_name":"Heike"},{"id":"3118","full_name":"Wiersema, Tobias","last_name":"Wiersema","first_name":"Tobias"}],"date_created":"2021-11-25T14:12:22Z","year":"2021","citation":{"chicago":"Jakobs, Marie-Christine, Felix Pauck, Marco Platzner, Heike Wehrheim, and Tobias Wiersema. “Software/Hardware Co-Verification for Custom Instruction Set Processors.” <i>IEEE Access</i>, 2021. <a href=\"https://doi.org/10.1109/ACCESS.2021.3131213\">https://doi.org/10.1109/ACCESS.2021.3131213</a>.","ieee":"M.-C. Jakobs, F. Pauck, M. Platzner, H. Wehrheim, and T. Wiersema, “Software/Hardware Co-Verification for Custom Instruction Set Processors,” <i>IEEE Access</i>, 2021, doi: <a href=\"https://doi.org/10.1109/ACCESS.2021.3131213\">10.1109/ACCESS.2021.3131213</a>.","ama":"Jakobs M-C, Pauck F, Platzner M, Wehrheim H, Wiersema T. Software/Hardware Co-Verification for Custom Instruction Set Processors. <i>IEEE Access</i>. Published online 2021. doi:<a href=\"https://doi.org/10.1109/ACCESS.2021.3131213\">10.1109/ACCESS.2021.3131213</a>","bibtex":"@article{Jakobs_Pauck_Platzner_Wehrheim_Wiersema_2021, title={Software/Hardware Co-Verification for Custom Instruction Set Processors}, DOI={<a href=\"https://doi.org/10.1109/ACCESS.2021.3131213\">10.1109/ACCESS.2021.3131213</a>}, journal={IEEE Access}, publisher={IEEE}, author={Jakobs, Marie-Christine and Pauck, Felix and Platzner, Marco and Wehrheim, Heike and Wiersema, Tobias}, year={2021} }","mla":"Jakobs, Marie-Christine, et al. “Software/Hardware Co-Verification for Custom Instruction Set Processors.” <i>IEEE Access</i>, IEEE, 2021, doi:<a href=\"https://doi.org/10.1109/ACCESS.2021.3131213\">10.1109/ACCESS.2021.3131213</a>.","short":"M.-C. Jakobs, F. Pauck, M. Platzner, H. Wehrheim, T. Wiersema, IEEE Access (2021).","apa":"Jakobs, M.-C., Pauck, F., Platzner, M., Wehrheim, H., &#38; Wiersema, T. (2021). Software/Hardware Co-Verification for Custom Instruction Set Processors. <i>IEEE Access</i>. <a href=\"https://doi.org/10.1109/ACCESS.2021.3131213\">https://doi.org/10.1109/ACCESS.2021.3131213</a>"},"quality_controlled":"1","publication_status":"published"},{"type":"conference","publication":"Software Engineering 2021","editor":[{"last_name":"Koziolek","full_name":"Koziolek, Anne","first_name":"Anne"},{"full_name":"Schaefer, Ina","last_name":"Schaefer","first_name":"Ina"},{"full_name":"Seidl, Christoph","last_name":"Seidl","first_name":"Christoph"}],"status":"public","project":[{"name":"SFB 901","_id":"1"},{"_id":"3","name":"SFB 901 - Project Area B"},{"_id":"12","name":"SFB 901 - Subproject B4"}],"_id":"21238","user_id":"22398","department":[{"_id":"77"}],"language":[{"iso":"eng"}],"publication_status":"published","place":"Bonn","year":"2021","citation":{"apa":"Pauck, F., &#38; Wehrheim, H. (2021). Cooperative Android App Analysis with CoDiDroid. In A. Koziolek, I. Schaefer, &#38; C. Seidl (Eds.), <i>Software Engineering 2021</i> (pp. 83–84). Gesellschaft für Informatik e.V. <a href=\"https://doi.org/10.18420/SE2021_30 \">https://doi.org/10.18420/SE2021_30 </a>","mla":"Pauck, Felix, and Heike Wehrheim. “Cooperative Android App Analysis with CoDiDroid.” <i>Software Engineering 2021</i>, edited by Anne Koziolek et al., Gesellschaft für Informatik e.V., 2021, pp. 83–84, doi:<a href=\"https://doi.org/10.18420/SE2021_30 \">10.18420/SE2021_30 </a>.","short":"F. Pauck, H. Wehrheim, in: A. Koziolek, I. Schaefer, C. Seidl (Eds.), Software Engineering 2021, Gesellschaft für Informatik e.V., Bonn, 2021, pp. 83–84.","bibtex":"@inproceedings{Pauck_Wehrheim_2021, place={Bonn}, title={Cooperative Android App Analysis with CoDiDroid}, DOI={<a href=\"https://doi.org/10.18420/SE2021_30 \">10.18420/SE2021_30 </a>}, booktitle={Software Engineering 2021}, publisher={Gesellschaft für Informatik e.V.}, author={Pauck, Felix and Wehrheim, Heike}, editor={Koziolek, Anne and Schaefer, Ina and Seidl, Christoph}, year={2021}, pages={83–84} }","ama":"Pauck F, Wehrheim H. Cooperative Android App Analysis with CoDiDroid. In: Koziolek A, Schaefer I, Seidl C, eds. <i>Software Engineering 2021</i>. Gesellschaft für Informatik e.V.; 2021:83-84. doi:<a href=\"https://doi.org/10.18420/SE2021_30 \">10.18420/SE2021_30 </a>","ieee":"F. Pauck and H. Wehrheim, “Cooperative Android App Analysis with CoDiDroid,” in <i>Software Engineering 2021</i>, 2021, pp. 83–84, doi: <a href=\"https://doi.org/10.18420/SE2021_30 \">10.18420/SE2021_30 </a>.","chicago":"Pauck, Felix, and Heike Wehrheim. “Cooperative Android App Analysis with CoDiDroid.” In <i>Software Engineering 2021</i>, edited by Anne Koziolek, Ina Schaefer, and Christoph Seidl, 83–84. Bonn: Gesellschaft für Informatik e.V., 2021. <a href=\"https://doi.org/10.18420/SE2021_30 \">https://doi.org/10.18420/SE2021_30 </a>."},"page":" 83-84 ","publisher":"Gesellschaft für Informatik e.V.","date_updated":"2023-01-18T08:35:20Z","author":[{"first_name":"Felix","last_name":"Pauck","full_name":"Pauck, Felix","id":"22398"},{"last_name":"Wehrheim","full_name":"Wehrheim, Heike","id":"573","first_name":"Heike"}],"date_created":"2021-02-16T09:28:49Z","title":"Cooperative Android App Analysis with CoDiDroid","doi":"10.18420/SE2021_30 "},{"volume":104,"author":[{"full_name":"Menzefricke, Jörn Steffen","id":"29799","last_name":"Menzefricke","first_name":"Jörn Steffen"},{"first_name":"Ingrid","last_name":"Wiederkehr","full_name":"Wiederkehr, Ingrid","id":"38169"},{"full_name":"Koldewey, Christian","id":"43136","orcid":"https://orcid.org/0000-0001-7992-6399","last_name":"Koldewey","first_name":"Christian"},{"last_name":"Dumitrescu","id":"16190","full_name":"Dumitrescu, Roman","first_name":"Roman"}],"date_created":"2023-01-18T13:29:31Z","publisher":"Elsevier BV","date_updated":"2023-01-18T13:32:38Z","doi":"10.1016/j.procir.2021.11.041","title":"Maturity-based Development of Strategic Thrusts for Socio-technical Risks","publication_identifier":{"issn":["2212-8271"]},"publication_status":"published","page":"241-246","intvolume":"       104","citation":{"apa":"Menzefricke, J. S., Wiederkehr, I., Koldewey, C., &#38; Dumitrescu, R. (2021). Maturity-based Development of Strategic Thrusts for Socio-technical Risks. <i>Procedia CIRP</i>, <i>104</i>, 241–246. <a href=\"https://doi.org/10.1016/j.procir.2021.11.041\">https://doi.org/10.1016/j.procir.2021.11.041</a>","mla":"Menzefricke, Jörn Steffen, et al. “Maturity-Based Development of Strategic Thrusts for Socio-Technical Risks.” <i>Procedia CIRP</i>, vol. 104, Elsevier BV, 2021, pp. 241–46, doi:<a href=\"https://doi.org/10.1016/j.procir.2021.11.041\">10.1016/j.procir.2021.11.041</a>.","bibtex":"@article{Menzefricke_Wiederkehr_Koldewey_Dumitrescu_2021, title={Maturity-based Development of Strategic Thrusts for Socio-technical Risks}, volume={104}, DOI={<a href=\"https://doi.org/10.1016/j.procir.2021.11.041\">10.1016/j.procir.2021.11.041</a>}, journal={Procedia CIRP}, publisher={Elsevier BV}, author={Menzefricke, Jörn Steffen and Wiederkehr, Ingrid and Koldewey, Christian and Dumitrescu, Roman}, year={2021}, pages={241–246} }","short":"J.S. Menzefricke, I. Wiederkehr, C. Koldewey, R. Dumitrescu, Procedia CIRP 104 (2021) 241–246.","ama":"Menzefricke JS, Wiederkehr I, Koldewey C, Dumitrescu R. Maturity-based Development of Strategic Thrusts for Socio-technical Risks. <i>Procedia CIRP</i>. 2021;104:241-246. doi:<a href=\"https://doi.org/10.1016/j.procir.2021.11.041\">10.1016/j.procir.2021.11.041</a>","chicago":"Menzefricke, Jörn Steffen, Ingrid Wiederkehr, Christian Koldewey, and Roman Dumitrescu. “Maturity-Based Development of Strategic Thrusts for Socio-Technical Risks.” <i>Procedia CIRP</i> 104 (2021): 241–46. <a href=\"https://doi.org/10.1016/j.procir.2021.11.041\">https://doi.org/10.1016/j.procir.2021.11.041</a>.","ieee":"J. S. Menzefricke, I. Wiederkehr, C. Koldewey, and R. Dumitrescu, “Maturity-based Development of Strategic Thrusts for Socio-technical Risks,” <i>Procedia CIRP</i>, vol. 104, pp. 241–246, 2021, doi: <a href=\"https://doi.org/10.1016/j.procir.2021.11.041\">10.1016/j.procir.2021.11.041</a>."},"year":"2021","department":[{"_id":"563"}],"user_id":"14931","_id":"37404","language":[{"iso":"eng"}],"keyword":["General Medicine"],"publication":"Procedia CIRP","type":"journal_article","status":"public"},{"citation":{"bibtex":"@book{Böttger_2021, title={IND-CCA Secure PKE Schemes - Based on Lattices}, author={Böttger, Meret Amalia Elisabeth}, year={2021} }","short":"M.A.E. Böttger, IND-CCA Secure PKE Schemes - Based on Lattices, 2021.","mla":"Böttger, Meret Amalia Elisabeth. <i>IND-CCA Secure PKE Schemes - Based on Lattices</i>. 2021.","apa":"Böttger, M. A. E. (2021). <i>IND-CCA Secure PKE Schemes - Based on Lattices</i>.","chicago":"Böttger, Meret Amalia Elisabeth. <i>IND-CCA Secure PKE Schemes - Based on Lattices</i>, 2021.","ieee":"M. A. E. Böttger, <i>IND-CCA Secure PKE Schemes - Based on Lattices</i>. 2021.","ama":"Böttger MAE. <i>IND-CCA Secure PKE Schemes - Based on Lattices</i>.; 2021."},"year":"2021","author":[{"first_name":"Meret Amalia Elisabeth","full_name":"Böttger, Meret Amalia Elisabeth","last_name":"Böttger"}],"date_created":"2022-07-20T11:42:08Z","supervisor":[{"last_name":"Blömer","full_name":"Blömer, Johannes","first_name":"Johannes"}],"date_updated":"2023-01-23T13:03:05Z","title":"IND-CCA Secure PKE Schemes - Based on Lattices","type":"bachelorsthesis","status":"public","user_id":"47434","department":[{"_id":"64"}],"_id":"32402","language":[{"iso":"eng"}]},{"_id":"29710","user_id":"58465","department":[{"_id":"67"}],"language":[{"iso":"eng"}],"type":"journal_article","publication":"INFOS 2021–19. GI-Fachtagung Informatik und Schule","status":"public","date_updated":"2023-01-30T12:10:43Z","publisher":"Gesellschaft für Informatik, Bonn","author":[{"first_name":"Susanne","last_name":"Podworny","full_name":"Podworny, Susanne"},{"first_name":"Lukas","full_name":"Höper, Lukas","last_name":"Höper"},{"full_name":"Fleischer, Yannik","last_name":"Fleischer","first_name":"Yannik"},{"first_name":"Sven","last_name":"Hüsing","full_name":"Hüsing, Sven","id":"58465"},{"full_name":"Schulte, Carsten","last_name":"Schulte","first_name":"Carsten"}],"date_created":"2022-01-31T14:08:16Z","title":"Data Science ab Klasse 5–Konkrete Unterrichtsvorschläge für künstliche Intelligenz unplugged und Datenbewusstsein","year":"2021","citation":{"ieee":"S. Podworny, L. Höper, Y. Fleischer, S. Hüsing, and C. Schulte, “Data Science ab Klasse 5–Konkrete Unterrichtsvorschläge für künstliche Intelligenz unplugged und Datenbewusstsein,” <i>INFOS 2021–19. GI-Fachtagung Informatik und Schule</i>, 2021.","chicago":"Podworny, Susanne, Lukas Höper, Yannik Fleischer, Sven Hüsing, and Carsten Schulte. “Data Science Ab Klasse 5–Konkrete Unterrichtsvorschläge Für Künstliche Intelligenz Unplugged Und Datenbewusstsein.” <i>INFOS 2021–19. GI-Fachtagung Informatik Und Schule</i>, 2021.","ama":"Podworny S, Höper L, Fleischer Y, Hüsing S, Schulte C. Data Science ab Klasse 5–Konkrete Unterrichtsvorschläge für künstliche Intelligenz unplugged und Datenbewusstsein. <i>INFOS 2021–19 GI-Fachtagung Informatik und Schule</i>. Published online 2021.","apa":"Podworny, S., Höper, L., Fleischer, Y., Hüsing, S., &#38; Schulte, C. (2021). Data Science ab Klasse 5–Konkrete Unterrichtsvorschläge für künstliche Intelligenz unplugged und Datenbewusstsein. <i>INFOS 2021–19. GI-Fachtagung Informatik Und Schule</i>.","bibtex":"@article{Podworny_Höper_Fleischer_Hüsing_Schulte_2021, title={Data Science ab Klasse 5–Konkrete Unterrichtsvorschläge für künstliche Intelligenz unplugged und Datenbewusstsein}, journal={INFOS 2021–19. GI-Fachtagung Informatik und Schule}, publisher={Gesellschaft für Informatik, Bonn}, author={Podworny, Susanne and Höper, Lukas and Fleischer, Yannik and Hüsing, Sven and Schulte, Carsten}, year={2021} }","short":"S. Podworny, L. Höper, Y. Fleischer, S. Hüsing, C. Schulte, INFOS 2021–19. GI-Fachtagung Informatik Und Schule (2021).","mla":"Podworny, Susanne, et al. “Data Science Ab Klasse 5–Konkrete Unterrichtsvorschläge Für Künstliche Intelligenz Unplugged Und Datenbewusstsein.” <i>INFOS 2021–19. GI-Fachtagung Informatik Und Schule</i>, Gesellschaft für Informatik, Bonn, 2021."}},{"date_created":"2022-01-31T14:14:03Z","author":[{"first_name":"Lukas","full_name":"Höper, Lukas","last_name":"Höper"},{"first_name":"Susanne","last_name":"Podworny","full_name":"Podworny, Susanne"},{"first_name":"Sven","full_name":"Hüsing, Sven","id":"58465","last_name":"Hüsing"},{"full_name":"Schulte, Carsten","last_name":"Schulte","first_name":"Carsten"},{"first_name":"Yannik","full_name":"Fleischer, Yannik","last_name":"Fleischer"},{"full_name":"Biehler, Rolf","last_name":"Biehler","first_name":"Rolf"},{"first_name":"Daniel","full_name":"Frischemeier, Daniel","last_name":"Frischemeier"},{"first_name":"Hülya","last_name":"Malatyali","full_name":"Malatyali, Hülya"}],"date_updated":"2023-01-30T12:10:23Z","publisher":"Gesellschaft für Informatik, Bonn","title":"Zur neuen Bedeutung von Daten in Data Science und künstlicher Intelligenz","citation":{"mla":"Höper, Lukas, et al. “Zur Neuen Bedeutung von Daten in Data Science Und Künstlicher Intelligenz.” <i>INFOS 2021–19. GI-Fachtagung Informatik Und Schule</i>, Gesellschaft für Informatik, Bonn, 2021.","bibtex":"@article{Höper_Podworny_Hüsing_Schulte_Fleischer_Biehler_Frischemeier_Malatyali_2021, title={Zur neuen Bedeutung von Daten in Data Science und künstlicher Intelligenz}, journal={INFOS 2021–19. GI-Fachtagung Informatik und Schule}, publisher={Gesellschaft für Informatik, Bonn}, author={Höper, Lukas and Podworny, Susanne and Hüsing, Sven and Schulte, Carsten and Fleischer, Yannik and Biehler, Rolf and Frischemeier, Daniel and Malatyali, Hülya}, year={2021} }","short":"L. Höper, S. Podworny, S. Hüsing, C. Schulte, Y. Fleischer, R. Biehler, D. Frischemeier, H. Malatyali, INFOS 2021–19. GI-Fachtagung Informatik Und Schule (2021).","apa":"Höper, L., Podworny, S., Hüsing, S., Schulte, C., Fleischer, Y., Biehler, R., Frischemeier, D., &#38; Malatyali, H. (2021). Zur neuen Bedeutung von Daten in Data Science und künstlicher Intelligenz. <i>INFOS 2021–19. GI-Fachtagung Informatik Und Schule</i>.","ama":"Höper L, Podworny S, Hüsing S, et al. Zur neuen Bedeutung von Daten in Data Science und künstlicher Intelligenz. <i>INFOS 2021–19 GI-Fachtagung Informatik und Schule</i>. Published online 2021.","ieee":"L. Höper <i>et al.</i>, “Zur neuen Bedeutung von Daten in Data Science und künstlicher Intelligenz,” <i>INFOS 2021–19. GI-Fachtagung Informatik und Schule</i>, 2021.","chicago":"Höper, Lukas, Susanne Podworny, Sven Hüsing, Carsten Schulte, Yannik Fleischer, Rolf Biehler, Daniel Frischemeier, and Hülya Malatyali. “Zur Neuen Bedeutung von Daten in Data Science Und Künstlicher Intelligenz.” <i>INFOS 2021–19. GI-Fachtagung Informatik Und Schule</i>, 2021."},"year":"2021","user_id":"58465","department":[{"_id":"67"}],"_id":"29712","language":[{"iso":"eng"}],"type":"journal_article","publication":"INFOS 2021–19. GI-Fachtagung Informatik und Schule","status":"public"},{"issue":"228","citation":{"chicago":"Hüsing, Sven, Niklas Weiser, and Rolf Biehler. “Faszination 3D-Film: Entwicklung Einer 3D-Konstruktion.” <i>Mathematik Lehren</i> 2021, no. 228 (2021): 23–27.","ieee":"S. Hüsing, N. Weiser, and R. Biehler, “Faszination 3D-Film: Entwicklung einer 3D-Konstruktion,” <i>mathematik lehren</i>, vol. 2021, no. 228, pp. 23–27, 2021.","ama":"Hüsing S, Weiser N, Biehler R. Faszination 3D-Film: Entwicklung einer 3D-Konstruktion. <i>mathematik lehren</i>. 2021;2021(228):23–27.","mla":"Hüsing, Sven, et al. “Faszination 3D-Film: Entwicklung Einer 3D-Konstruktion.” <i>Mathematik Lehren</i>, vol. 2021, no. 228, Friedrich Verlag, 2021, pp. 23–27.","short":"S. Hüsing, N. Weiser, R. Biehler, Mathematik Lehren 2021 (2021) 23–27.","bibtex":"@article{Hüsing_Weiser_Biehler_2021, title={Faszination 3D-Film: Entwicklung einer 3D-Konstruktion}, volume={2021}, number={228}, journal={mathematik lehren}, publisher={Friedrich Verlag}, author={Hüsing, Sven and Weiser, Niklas and Biehler, Rolf}, year={2021}, pages={23–27} }","apa":"Hüsing, S., Weiser, N., &#38; Biehler, R. (2021). Faszination 3D-Film: Entwicklung einer 3D-Konstruktion. <i>Mathematik Lehren</i>, <i>2021</i>(228), 23–27."},"page":"23–27","intvolume":"      2021","year":"2021","date_created":"2023-01-27T12:35:37Z","author":[{"last_name":"Hüsing","full_name":"Hüsing, Sven","id":"58465","first_name":"Sven"},{"full_name":"Weiser, Niklas","last_name":"Weiser","first_name":"Niklas"},{"last_name":"Biehler","id":"16274","full_name":"Biehler, Rolf","first_name":"Rolf"}],"volume":2021,"publisher":"Friedrich Verlag","date_updated":"2023-01-27T12:35:52Z","title":"Faszination 3D-Film: Entwicklung einer 3D-Konstruktion","type":"journal_article","publication":"mathematik lehren","status":"public","user_id":"58465","department":[{"_id":"67"}],"_id":"40512","language":[{"iso":"eng"}]},{"type":"journal_article","publication":"Quantum","abstract":[{"text":"<jats:p>A central tenet of theoretical cryptography is the study of the minimal assumptions required to implement a given cryptographic primitive. One such primitive is the one-time memory (OTM), introduced by Goldwasser, Kalai, and Rothblum [CRYPTO 2008], which is a classical functionality modeled after a non-interactive 1-out-of-2 oblivious transfer, and which is complete for one-time classical and quantum programs. It is known that secure OTMs do not exist in the standard model in both the classical and quantum settings. Here, we propose a scheme for using quantum information, together with the assumption of stateless (<mml:math xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"><mml:mi>i</mml:mi><mml:mo>.</mml:mo><mml:mi>e</mml:mi><mml:mo>.</mml:mo></mml:math>, reusable) hardware tokens, to build statistically secure OTMs. Via the semidefinite programming-based quantum games framework of Gutoski and Watrous [STOC 2007], we prove security for a malicious receiver making at most 0.114<mml:math xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"><mml:mi>n</mml:mi></mml:math> adaptive queries to the token (for <mml:math xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"><mml:mi>n</mml:mi></mml:math> the key size), in the quantum universal composability framework, but leave open the question of security against a polynomial amount of queries. Compared to alternative schemes derived from the literature on quantum money, our scheme is technologically simple since it is of the \"prepare-and-measure\" type. We also give two impossibility results showing certain assumptions in our scheme cannot be relaxed.</jats:p>","lang":"eng"}],"status":"public","_id":"29780","user_id":"71541","department":[{"_id":"623"},{"_id":"7"}],"article_number":"429","keyword":["Physics and Astronomy (miscellaneous)","Atomic and Molecular Physics","and Optics"],"language":[{"iso":"eng"}],"publication_status":"published","publication_identifier":{"issn":["2521-327X"]},"year":"2021","citation":{"apa":"Broadbent, A., Gharibian, S., &#38; Zhou, H.-S. (2021). Towards Quantum One-Time Memories from Stateless Hardware. <i>Quantum</i>, <i>5</i>, Article 429. <a href=\"https://doi.org/10.22331/q-2021-04-08-429\">https://doi.org/10.22331/q-2021-04-08-429</a>","short":"A. Broadbent, S. Gharibian, H.-S. Zhou, Quantum 5 (2021).","bibtex":"@article{Broadbent_Gharibian_Zhou_2021, title={Towards Quantum One-Time Memories from Stateless Hardware}, volume={5}, DOI={<a href=\"https://doi.org/10.22331/q-2021-04-08-429\">10.22331/q-2021-04-08-429</a>}, number={429}, journal={Quantum}, publisher={Verein zur Forderung des Open Access Publizierens in den Quantenwissenschaften}, author={Broadbent, Anne and Gharibian, Sevag and Zhou, Hong-Sheng}, year={2021} }","mla":"Broadbent, Anne, et al. “Towards Quantum One-Time Memories from Stateless Hardware.” <i>Quantum</i>, vol. 5, 429, Verein zur Forderung des Open Access Publizierens in den Quantenwissenschaften, 2021, doi:<a href=\"https://doi.org/10.22331/q-2021-04-08-429\">10.22331/q-2021-04-08-429</a>.","ama":"Broadbent A, Gharibian S, Zhou H-S. Towards Quantum One-Time Memories from Stateless Hardware. <i>Quantum</i>. 2021;5. doi:<a href=\"https://doi.org/10.22331/q-2021-04-08-429\">10.22331/q-2021-04-08-429</a>","ieee":"A. Broadbent, S. Gharibian, and H.-S. Zhou, “Towards Quantum One-Time Memories from Stateless Hardware,” <i>Quantum</i>, vol. 5, Art. no. 429, 2021, doi: <a href=\"https://doi.org/10.22331/q-2021-04-08-429\">10.22331/q-2021-04-08-429</a>.","chicago":"Broadbent, Anne, Sevag Gharibian, and Hong-Sheng Zhou. “Towards Quantum One-Time Memories from Stateless Hardware.” <i>Quantum</i> 5 (2021). <a href=\"https://doi.org/10.22331/q-2021-04-08-429\">https://doi.org/10.22331/q-2021-04-08-429</a>."},"intvolume":"         5","date_updated":"2023-02-28T11:07:47Z","publisher":"Verein zur Forderung des Open Access Publizierens in den Quantenwissenschaften","author":[{"first_name":"Anne","full_name":"Broadbent, Anne","last_name":"Broadbent"},{"first_name":"Sevag","orcid":"0000-0002-9992-3379","last_name":"Gharibian","id":"71541","full_name":"Gharibian, Sevag"},{"first_name":"Hong-Sheng","full_name":"Zhou, Hong-Sheng","last_name":"Zhou"}],"date_created":"2022-02-08T10:59:00Z","volume":5,"title":"Towards Quantum One-Time Memories from Stateless Hardware","doi":"10.22331/q-2021-04-08-429"},{"year":"2021","citation":{"mla":"Ahmed, Qazi Arbab. “Hardware Trojans in Reconfigurable Computing.” <i>2021 IFIP/IEEE 29th International Conference on Very Large Scale Integration (VLSI-SoC)</i>, 2021, doi:<a href=\"https://doi.org/10.1109/vlsi-soc53125.2021.9606974\">10.1109/vlsi-soc53125.2021.9606974</a>.","bibtex":"@inproceedings{Ahmed_2021, title={Hardware Trojans in Reconfigurable Computing}, DOI={<a href=\"https://doi.org/10.1109/vlsi-soc53125.2021.9606974\">10.1109/vlsi-soc53125.2021.9606974</a>}, booktitle={2021 IFIP/IEEE 29th International Conference on Very Large Scale Integration (VLSI-SoC)}, author={Ahmed, Qazi Arbab}, year={2021} }","short":"Q.A. Ahmed, in: 2021 IFIP/IEEE 29th International Conference on Very Large Scale Integration (VLSI-SoC), 2021.","apa":"Ahmed, Q. A. (2021). Hardware Trojans in Reconfigurable Computing. <i>2021 IFIP/IEEE 29th International Conference on Very Large Scale Integration (VLSI-SoC)</i>. <a href=\"https://doi.org/10.1109/vlsi-soc53125.2021.9606974\">https://doi.org/10.1109/vlsi-soc53125.2021.9606974</a>","ama":"Ahmed QA. Hardware Trojans in Reconfigurable Computing. In: <i>2021 IFIP/IEEE 29th International Conference on Very Large Scale Integration (VLSI-SoC)</i>. ; 2021. doi:<a href=\"https://doi.org/10.1109/vlsi-soc53125.2021.9606974\">10.1109/vlsi-soc53125.2021.9606974</a>","chicago":"Ahmed, Qazi Arbab. “Hardware Trojans in Reconfigurable Computing.” In <i>2021 IFIP/IEEE 29th International Conference on Very Large Scale Integration (VLSI-SoC)</i>, 2021. <a href=\"https://doi.org/10.1109/vlsi-soc53125.2021.9606974\">https://doi.org/10.1109/vlsi-soc53125.2021.9606974</a>.","ieee":"Q. A. Ahmed, “Hardware Trojans in Reconfigurable Computing,” 2021, doi: <a href=\"https://doi.org/10.1109/vlsi-soc53125.2021.9606974\">10.1109/vlsi-soc53125.2021.9606974</a>."},"publication_status":"published","title":"Hardware Trojans in Reconfigurable Computing","doi":"10.1109/vlsi-soc53125.2021.9606974","date_updated":"2023-04-19T15:03:45Z","date_created":"2021-12-30T00:02:24Z","author":[{"id":"72764","full_name":"Ahmed, Qazi Arbab","last_name":"Ahmed","orcid":"0000-0002-1837-2254","first_name":"Qazi Arbab"}],"status":"public","publication":"2021 IFIP/IEEE 29th International Conference on Very Large Scale Integration (VLSI-SoC)","type":"conference","language":[{"iso":"eng"}],"_id":"29138","project":[{"name":"SFB 901 - B: SFB 901 - Project Area B","_id":"3"},{"name":"SFB 901 - B4: SFB 901 - Subproject B4","_id":"12"},{"name":"SFB 901: SFB 901","_id":"1"}],"department":[{"_id":"78"}],"user_id":"72764"},{"language":[{"iso":"eng"}],"_id":"44234","project":[{"_id":"1","name":"SFB 901: SFB 901"},{"_id":"2","name":"SFB 901 - A: SFB 901 - Project Area A"},{"name":"SFB 901 - A1: SFB 901 - Subproject A1","_id":"5"}],"department":[{"_id":"63"}],"user_id":"39241","status":"public","type":"bachelorsthesis","title":"Combining Mobility, Heterogeneity, and Leasing Approaches for Online Resource Allocation","date_updated":"2023-04-27T15:34:17Z","date_created":"2023-04-27T15:34:07Z","supervisor":[{"first_name":"Friedhelm","last_name":"Meyer auf der Heide","full_name":"Meyer auf der Heide, Friedhelm","id":"15523"}],"author":[{"full_name":"Berger, Thilo Frederik","last_name":"Berger","first_name":"Thilo Frederik"}],"year":"2021","citation":{"short":"T.F. Berger, Combining Mobility, Heterogeneity, and Leasing Approaches for Online Resource Allocation, 2021.","bibtex":"@book{Berger_2021, title={Combining Mobility, Heterogeneity, and Leasing Approaches for Online Resource Allocation}, author={Berger, Thilo Frederik}, year={2021} }","mla":"Berger, Thilo Frederik. <i>Combining Mobility, Heterogeneity, and Leasing Approaches for Online Resource Allocation</i>. 2021.","apa":"Berger, T. F. (2021). <i>Combining Mobility, Heterogeneity, and Leasing Approaches for Online Resource Allocation</i>.","ieee":"T. F. Berger, <i>Combining Mobility, Heterogeneity, and Leasing Approaches for Online Resource Allocation</i>. 2021.","chicago":"Berger, Thilo Frederik. <i>Combining Mobility, Heterogeneity, and Leasing Approaches for Online Resource Allocation</i>, 2021.","ama":"Berger TF. <i>Combining Mobility, Heterogeneity, and Leasing Approaches for Online Resource Allocation</i>.; 2021."}},{"department":[{"_id":"63"}],"user_id":"39241","_id":"44233","project":[{"name":"SFB 901: SFB 901","_id":"1"},{"_id":"2","name":"SFB 901 - A: SFB 901 - Project Area A"},{"_id":"5","name":"SFB 901 - A1: SFB 901 - Subproject A1"}],"language":[{"iso":"eng"}],"type":"bachelorsthesis","status":"public","date_created":"2023-04-27T15:31:26Z","supervisor":[{"first_name":"Friedhelm","last_name":"Meyer auf der Heide","id":"15523","full_name":"Meyer auf der Heide, Friedhelm"}],"author":[{"last_name":"Pranger","full_name":"Pranger, Sebastian","first_name":"Sebastian"}],"date_updated":"2023-04-27T15:31:57Z","title":"Online k-Facility Reallocation using k-Server Algorithms","citation":{"ama":"Pranger S. <i>Online K-Facility Reallocation Using k-Server Algorithms</i>.; 2021.","chicago":"Pranger, Sebastian. <i>Online K-Facility Reallocation Using k-Server Algorithms</i>, 2021.","ieee":"S. Pranger, <i>Online k-Facility Reallocation using k-Server Algorithms</i>. 2021.","short":"S. Pranger, Online K-Facility Reallocation Using k-Server Algorithms, 2021.","bibtex":"@book{Pranger_2021, title={Online k-Facility Reallocation using k-Server Algorithms}, author={Pranger, Sebastian}, year={2021} }","mla":"Pranger, Sebastian. <i>Online K-Facility Reallocation Using k-Server Algorithms</i>. 2021.","apa":"Pranger, S. (2021). <i>Online k-Facility Reallocation using k-Server Algorithms</i>."},"year":"2021"},{"place":"Alpexpo | Grenoble, France","citation":{"ieee":"Q. A. Ahmed, T. Wiersema, and M. Platzner, “Malicious Routing: Circumventing Bitstream-level Verification for FPGAs,” presented at the Design, Automation and Test in Europe Conference (DATE’21), Alpexpo | Grenoble, France, 2021, doi: <a href=\"https://doi.org/10.23919/DATE51398.2021.9474026\">10.23919/DATE51398.2021.9474026</a>.","chicago":"Ahmed, Qazi Arbab, Tobias Wiersema, and Marco Platzner. “Malicious Routing: Circumventing Bitstream-Level Verification for FPGAs.” In <i>2021 Design, Automation &#38; Test in Europe Conference &#38; Exhibition (DATE)</i>. Alpexpo | Grenoble, France: 2021 Design, Automation and Test in Europe Conference (DATE), 2021. <a href=\"https://doi.org/10.23919/DATE51398.2021.9474026\">https://doi.org/10.23919/DATE51398.2021.9474026</a>.","ama":"Ahmed QA, Wiersema T, Platzner M. Malicious Routing: Circumventing Bitstream-level Verification for FPGAs. In: <i>2021 Design, Automation &#38; Test in Europe Conference &#38; Exhibition (DATE)</i>. 2021 Design, Automation and Test in Europe Conference (DATE); 2021. doi:<a href=\"https://doi.org/10.23919/DATE51398.2021.9474026\">10.23919/DATE51398.2021.9474026</a>","mla":"Ahmed, Qazi Arbab, et al. “Malicious Routing: Circumventing Bitstream-Level Verification for FPGAs.” <i>2021 Design, Automation &#38; Test in Europe Conference &#38; Exhibition (DATE)</i>, 2021 Design, Automation and Test in Europe Conference (DATE), 2021, doi:<a href=\"https://doi.org/10.23919/DATE51398.2021.9474026\">10.23919/DATE51398.2021.9474026</a>.","short":"Q.A. Ahmed, T. Wiersema, M. Platzner, in: 2021 Design, Automation &#38; Test in Europe Conference &#38; Exhibition (DATE), 2021 Design, Automation and Test in Europe Conference (DATE), Alpexpo | Grenoble, France, 2021.","bibtex":"@inproceedings{Ahmed_Wiersema_Platzner_2021, place={Alpexpo | Grenoble, France}, title={Malicious Routing: Circumventing Bitstream-level Verification for FPGAs}, DOI={<a href=\"https://doi.org/10.23919/DATE51398.2021.9474026\">10.23919/DATE51398.2021.9474026</a>}, booktitle={2021 Design, Automation &#38; Test in Europe Conference &#38; Exhibition (DATE)}, publisher={2021 Design, Automation and Test in Europe Conference (DATE)}, author={Ahmed, Qazi Arbab and Wiersema, Tobias and Platzner, Marco}, year={2021} }","apa":"Ahmed, Q. A., Wiersema, T., &#38; Platzner, M. (2021). Malicious Routing: Circumventing Bitstream-level Verification for FPGAs. <i>2021 Design, Automation &#38; Test in Europe Conference &#38; Exhibition (DATE)</i>. Design, Automation and Test in Europe Conference (DATE’21), Alpexpo | Grenoble, France. <a href=\"https://doi.org/10.23919/DATE51398.2021.9474026\">https://doi.org/10.23919/DATE51398.2021.9474026</a>"},"publication_status":"published","has_accepted_license":"1","publication_identifier":{"eisbn":["978-3-9819263-5-4"]},"main_file_link":[{"open_access":"1"}],"conference":{"location":"Alpexpo | Grenoble, France","end_date":"2021-02-05","start_date":"2021-02-01","name":"Design, Automation and Test in Europe Conference (DATE'21)"},"doi":"10.23919/DATE51398.2021.9474026","date_updated":"2023-05-11T09:16:34Z","oa":"1","author":[{"first_name":"Qazi Arbab","last_name":"Ahmed","orcid":"0000-0002-1837-2254","id":"72764","full_name":"Ahmed, Qazi Arbab"},{"id":"3118","full_name":"Wiersema, Tobias","last_name":"Wiersema","first_name":"Tobias"},{"last_name":"Platzner","full_name":"Platzner, Marco","id":"398","first_name":"Marco"}],"status":"public","type":"conference","file_date_updated":"2023-05-11T09:16:15Z","project":[{"_id":"12","name":"SFB 901 - Subproject B4"},{"name":"SFB 901 - Project Area B","_id":"3"},{"_id":"1","name":"SFB 901"}],"_id":"20681","user_id":"72764","department":[{"_id":"78"}],"year":"2021","title":"Malicious Routing: Circumventing Bitstream-level Verification for FPGAs","publisher":"2021 Design, Automation and Test in Europe Conference (DATE)","date_created":"2020-12-07T14:03:00Z","abstract":[{"text":"The battle of developing hardware Trojans and corresponding countermeasures has taken adversaries towards ingenious ways of compromising hardware designs by circumventing even advanced testing and verification methods. Besides conventional methods of inserting Trojans into a design by a malicious entity, the design flow for field-programmable gate arrays (FPGAs) can also be surreptitiously compromised to assist the attacker to perform a successful malfunctioning or information leakage attack. The advanced stealthy malicious look-up-table (LUT) attack activates a Trojan only when generating the FPGA bitstream and can thus not be detected by register transfer and gate level testing and verification. However, also this attack was recently revealed by a bitstream-level proof-carrying hardware (PCH) approach. In this paper, we present a novel attack that leverages malicious routing of the inserted Trojan circuit to acquire a dormant state even in the generated and transmitted bitstream. The Trojan's payload is connected to primary inputs/outputs of the FPGA via a programmable interconnect point (PIP). The Trojan is detached from inputs/outputs during place-and-route and re-connected only when the FPGA is being programmed, thus activating the Trojan circuit without any need for a trigger logic. Since the Trojan is injected in a post-synthesis step and remains unconnected in the bitstream, the presented attack can currently neither be prevented by conventional testing and verification methods nor by recent bitstream-level verification techniques.","lang":"eng"}],"file":[{"file_size":394011,"access_level":"closed","file_id":"44752","file_name":"1812.pdf","date_updated":"2023-05-11T09:16:15Z","creator":"qazi","date_created":"2023-05-11T09:16:15Z","success":1,"relation":"main_file","content_type":"application/pdf"}],"publication":"2021 Design, Automation & Test in Europe Conference & Exhibition (DATE)","ddc":["006"],"language":[{"iso":"eng"}]},{"author":[{"last_name":"N.","full_name":"N., N.","first_name":"N."}],"date_created":"2023-05-23T13:09:53Z","supervisor":[{"id":"8447","full_name":"Yigitbas, Enes","orcid":"0000-0002-5967-833X","last_name":"Yigitbas","first_name":"Enes"},{"first_name":"Sebastian","last_name":"Gottschalk","full_name":"Gottschalk, Sebastian","id":"47208"}],"date_updated":"2023-05-23T13:09:58Z","title":"Design and Implementation of a Crowd-based Prototype Validation Platform","citation":{"mla":"N., N. <i>Design and Implementation of a Crowd-Based Prototype Validation Platform</i>. 2021.","bibtex":"@book{N._2021, title={Design and Implementation of a Crowd-based Prototype Validation Platform}, author={N., N.}, year={2021} }","short":"N. N., Design and Implementation of a Crowd-Based Prototype Validation Platform, 2021.","apa":"N., N. (2021). <i>Design and Implementation of a Crowd-based Prototype Validation Platform</i>.","ama":"N. N. <i>Design and Implementation of a Crowd-Based Prototype Validation Platform</i>.; 2021.","ieee":"N. N., <i>Design and Implementation of a Crowd-based Prototype Validation Platform</i>. 2021.","chicago":"N., N. <i>Design and Implementation of a Crowd-Based Prototype Validation Platform</i>, 2021."},"year":"2021","department":[{"_id":"66"}],"user_id":"47208","_id":"45236","project":[{"name":"SFB 901 - C: SFB 901 - Project Area C","_id":"4"},{"name":"SFB 901: SFB 901","_id":"1"},{"name":"SFB 901 - C5: SFB 901 - Subproject C5","_id":"17"}],"language":[{"iso":"eng"}],"type":"mastersthesis","status":"public"}]
