Explore the words cloud of the EPoCH project. It provides you a very rough idea of what is the project "EPoCH" about.
The following table provides information about the project.
|Coordinator Country||Germany [DE]|
|Total cost||2˙498˙286 €|
|EC max contribution||2˙498˙286 € (100%)|
1. H2020-EU.1.1. (EXCELLENT SCIENCE - European Research Council (ERC))
|Duration (year-month-day)||from 2016-10-01 to 2021-09-30|
Take a look of project's partnership.
|1||RUHR-UNIVERSITAET BOCHUM||DE (BOCHUM)||coordinator||2˙498˙286.00|
The digital landscape is currently undergoing an evolution towards the Internet of Things. The IoT comes with a dramatically increased threat potential, as attacks can endanger human life and can lead to a massive loss of privacy of (European) citizens. A particular dangerous class of attacks manipulates the cryptographic algorithms in the underlying hardware. Backdoors in the cryptography of IoT devices can lead to system-wide loss of security. This proposal has the ambitious goal to comprehensively understand and counter low-level backdoor attacks. The required research consists of two major modules:
1) The development of an encompassing understanding of how hardware manipulations of cryptographic functions can actually be performed, and what the consequences are for the system security. Exploring attacks is fundamental for designing strong countermeasures, analogous to the role of cryptanalysis in cryptology.
2) The development of hardware countermeasures that provide systematic protection against malicious manipulations. In contrast to detection-based methods which dominate the literature, our approach will be pro-active. We will develop solutions for instances of important problems, including hardware reverse engineering and hardware hiding. Little is known about the limits of and optimum approaches to both problems in specific settings.
Beyond prevention of hardware Trojans, the research will have applications in IP protection and will spark research in the theory of computer science community.
|year||authors and title||journal||last update|
Pawel Swierczynski, Marc Fyrbiak, Philipp Koppe, Amir Moradi, Christof Paar
Interdiction in practiceâ€”Hardware Trojan against a high-security USB flash drive
published pages: 199-211, ISSN: 2190-8508, DOI: 10.1007/s13389-016-0132-7
|Journal of Cryptographic Engineering 7/3||2019-08-29|
Marc Fyrbiak, Sebastian Wallat, Pawel Swierczynski, Max Hoffmann, Sebastian Hoppach, Matthias Wilhelm, Tobias Weidlich, Russell Tessier, Christof Paar
HALâ€”The Missing Piece of the Puzzle for Hardware Reverse Engineering, Trojan Detection and Insertion
published pages: 498-510, ISSN: 1545-5971, DOI: 10.1109/tdsc.2018.2812183
|IEEE Transactions on Dependable and Secure Computing 16/3||2019-08-29|
Marc Fyrbiak, Simon Rokicki, Nicolai Bissantz, Russell Tessier, Christof Paar
Hybrid Obfuscation to Protect Against Disclosure Attacks on Embedded Microprocessors
published pages: 307-321, ISSN: 0018-9340, DOI: 10.1109/tc.2017.2649520
|IEEE Transactions on Computers 67/3||2019-08-29|
Arunkumar Vijayakumar, Vinay C. Patil, Daniel E. Holcomb, Christof Paar, Sandip Kundu
Physical Design Obfuscation of Hardware: A Comprehensive Investigation of Device and Logic-Level Techniques
published pages: 64-77, ISSN: 1556-6013, DOI: 10.1109/tifs.2016.2601067
|IEEE Transactions on Information Forensics and Security 12/1||2019-08-29|
Max Hoffmann, Christof Paar
Stealthy Opaque Predicates in Hardware - Obfuscating Constant Expressions at Negligible Overhead
published pages: 277-297, ISSN: , DOI: 10.13154/tches.v2018.i2.277-297
|IACR Trans. Cryptogr. Hardw. Embed. Syst. 2||2019-08-29|
Marc Fyrbiak, Sebastian Wallat, Jonathan DÃ©chelotte, Nils Albartus, Sinan BÃ¶cker, Russell Tessier, Christof Paar
On the Difficulty of FSM-based Hardware Obfuscation
published pages: 293-330, ISSN: , DOI: 10.13154/tches.v2018.i3.293-330
|IACR Trans. Cryptogr. Hardw. Embed. Syst 3||2019-08-29|
Philipp Koppe, Benjamin Kollenda, Marc Fyrbiak, Christian Kison, Robert Gawlik, Christof Paar, Thorsten Holz
Reverse Engineering x86 Processor Microcode
published pages: 1163-1180, ISSN: , DOI:
|26th USENIX Security Symposium 2017||2019-08-29|
Are you the coordinator (or a participant) of this project? Plaese send me more information about the "EPOCH" project.
For instance: the website url (it has not provided by EU-opendata yet), the logo, a more detailed description of the project (in plain text as a rtf file or a word file), some pictures (as picture files, not embedded into any word file), twitter account, linkedin page, etc.
Send me an email (firstname.lastname@example.org) and I put them in your project's page as son as possible.
Thanks. And then put a link of this page into your project's website.
The information about "EPOCH" are provided by the European Opendata Portal: CORDIS opendata.