


default search action
Dominik Merli
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c25]Andreas Halbritter
, Dominik Merli
:
Accuracy Evaluation of SBOM Tools for Web Applications and System-Level Software. ARES 2024: 55:1-55:9 - [c24]Philipp Schloyer
, Peter Knauer
, Bernhard Bauer
, Dominik Merli
:
Automating Side-Channel Testing for Embedded Systems: A Continuous Integration Approach. ARES 2024: 173:1-173:6 - [c23]Song Son Ha, Florian Foerster
, Henry Beuster, Thomas Robert Doebbert, Dominik Merli, Gerd Scholl:
Attacking Automation Systems via the PLC Backplane Bus. CASE 2024: 3725-3732 - [c22]Philipp Schubaur
, Peter Knauer
, Dominik Merli
:
Threats to the IoT Device Production Processes - A Blind Spot in the Product Security Lifecycle. IFIPIoT (2) 2024: 87-103 - [c21]Alexander Stegmeier, Peter Knauer, Philipp Schubaur
, Christian Piatka, Dominik Merli, Sebastian Altmeyer:
Safe and Secure? On the Timing Analysability of Cryptographic Implementations. RTAS 2024: 68-80 - 2023
- [c20]Philipp Schubaur
, Peter Knauer
, Dominik Merli
:
FISMOS - An FPGA Implementation of a Security Module as Open Source. ARES 2023: 88:1-88:8 - 2022
- [c19]Thomas Robert Doebbert
, Florian Fischer, Dominik Merli, Gerd Scholl:
On the Security of IO-Link Wireless Communication in the Safety Domain. ETFA 2022: 1-8 - [i11]Thomas Robert Doebbert, Florian Fischer, Dominik Merli, Gerd Scholl:
On the Security of IO-Link Wireless Communication in the Safety Domain. CoRR abs/2207.12938 (2022) - [i10]Thomas Robert Doebbert, Henry Beuster, Florian Fischer, Dominik Merli, Gerd Scholl:
Testbed for Functional Safety-Relevant Wireless Communication Based on IO-Link Wireless and 5G. CoRR abs/2212.14364 (2022) - 2021
- [c18]Susanne Kießling, Thomas Hanka, Dominik Merli:
Salt&Pepper: Spice up Security Behavior with Cognitive Triggers. EICC 2021: 26-31 - [c17]Dominik Fuchs, Ann-Kathrin Waibel, Maximilian Karthan, Nadine Seifert, Michael Örtl, Sabrina Bethge, Gina Fischer, Luca Waschbüsch, Steffen Netzband, Frank Kramer, Andreas Mahler, Alexandra Teynor
, Dominik Merli, Elisabeth Veronica Mess, Jennifer Öttinger, Stefanie Schmid, Amelie Scheu, Walter Swoboda, Petra Friedrich:
CARE REGIO - Digital Transformation and Technology in Nursing Care. ICIMTH 2021: 286-289 - [c16]Matthias Niedermaier, Thomas Hanka, Florian Fischer, Dominik Merli:
A Secure Network Scanner Architecture for Asset Management in Strongly Segmented ICS Networks. ICISSP 2021: 347-355 - 2020
- [c15]Florian Fischer
, Matthias Niedermaier
, Thomas Hanka, Peter Knauer
, Dominik Merli:
Analysis of Industrial Device Architectures for Real-Time Operations Under Denial of Service Attacks. ICICS 2020: 462-478 - [c14]Thomas Hanka
, Matthias Niedermaier, Florian Fischer, Susanne Kießling, Peter Knauer
, Dominik Merli:
Impact of Active Scanning Tools for Device Discovery in Industrial Networks. SpaCCS Workshops 2020: 557-572 - [i9]Florian Fischer, Matthias Niedermaier, Thomas Hanka, Peter Knauer, Dominik Merli:
Analysis of Industrial Device Architectures for Real-Time Operations under Denial of Service Attacks. CoRR abs/2007.08885 (2020)
2010 – 2019
- 2019
- [c13]Matthias Niedermaier, Dominik Merli, Georg Sigl:
A Secure Dual-MCU Architecture for Robust Communication of IIoT Devices. MECO 2019: 1-5 - [i8]Matthias Niedermaier, Thomas Hanka, Sven Plaga, Alexander von Bodisco, Dominik Merli:
Efficient Passive ICS Device Discovery and Identification by MAC Address Correlation. CoRR abs/1904.04271 (2019) - [i7]Matthias Niedermaier, Alexander von Bodisco, Dominik Merli:
CoRT: A Communication Robustness Testbed for Industrial Control System Components. CoRR abs/1904.04286 (2019) - [i6]Matthias Niedermaier, Martin Striegel, Felix Sauer, Dominik Merli, Georg Sigl:
Efficient Intrusion Detection on Low-Performance Industrial IoT Edge Node Devices. CoRR abs/1908.03964 (2019) - [i5]Matthias Niedermaier, Dominik Merli, Georg Sigl:
A Secure Dual-MCU Architecture for Robust Communication of IIoT Devices. CoRR abs/1908.04133 (2019) - [i4]Felix Sauer, Matthias Niedermaier, Susanne Kießling, Dominik Merli:
LICSTER - A Low-cost ICS Security Testbed for Education and Research. CoRR abs/1910.00303 (2019) - [i3]Matthias Niedermaier, Florian Fischer, Dominik Merli, Georg Sigl:
Network Scanning and Mapping for IIoT Edge Node Device Security. CoRR abs/1910.07622 (2019) - 2018
- [c12]Matthias Niedermaier, Jan-Ole Malchow, Florian Fischer, Daniel Marzin, Dominik Merli, Volker Roth, Alexander von Bodisco:
You Snooze, You Lose: Measuring PLC Cycle Times under Attacks. WOOT @ USENIX Security Symposium 2018 - 2015
- [c11]Rainer Plaga, Dominik Merli:
A new Definition and Classification of Physical Unclonable Functions. CS2@HiPEAC 2015: 7-12 - [i2]Rainer Plaga, Dominik Merli:
A new Definition and Classification of Physical Unclonable Functions. CoRR abs/1501.06363 (2015) - 2014
- [j2]Nisha Jacob
, Dominik Merli, Johann Heyszl, Georg Sigl:
Hardware Trojans: current challenges and approaches. IET Comput. Digit. Tech. 8(6): 264-273 (2014) - 2013
- [b1]Dominik Merli:
Attacking and protecting ring oscillator physical unclonable functions and code-offset fuzzy extractors. Technical University Munich, 2013, pp. 1-112 - [c10]Dominik Merli, Georg Sigl, Claudia Eckert:
Identities for Embedded Systems Enabled by Physical Unclonable Functions. Number Theory and Cryptography 2013: 125-138 - [c9]Dominik Merli, Rainer Plaga:
Physical unclonable functions: devices for cryptostorage. TrustED@CCS 2013: 1-2 - [c8]Nikolaus Theißing, Dominik Merli, Michael Smola, Frederic Stumpf, Georg Sigl:
Comprehensive analysis of software countermeasures against fault attacks. DATE 2013: 404-409 - [c7]Dominik Merli, Johann Heyszl, Benedikt Heinz, Dieter Schuster, Frederic Stumpf, Georg Sigl:
Localized electromagnetic analysis of RO PUFs. HOST 2013: 19-24 - [i1]Dominik Merli, Frederic Stumpf, Georg Sigl:
Protecting PUF Error Correction by Codeword Masking. IACR Cryptol. ePrint Arch. 2013: 334 (2013) - 2012
- [j1]Dominik Merli, Georg Sigl:
Physical Unclonable Functions. Datenschutz und Datensicherheit 36(12): 876-880 (2012) - [c6]Matthias Hiller
, Fabrizio De Santis, Dominik Merli, Georg Sigl:
Reliability bound and channel capacity of IBS-based fuzzy embedders. AHS 2012: 213-220 - [c5]Johann Heyszl, Dominik Merli, Benedikt Heinz, Fabrizio De Santis, Georg Sigl:
Strengths and Limitations of High-Resolution Electromagnetic Field Measurements for Side-Channel Analysis. CARDIS 2012: 248-262 - [c4]Matthias Hiller
, Dominik Merli, Frederic Stumpf, Georg Sigl:
Complementary IBS: Application specific error correction for PUFs. HOST 2012: 1-6 - [c3]Thomas Esbach, Walter Fumy, Olga Kulikovska, Dominik Merli, Dieter Schuster, Frederic Stumpf:
A New Security Architecture for Smartcards Utilizing PUFs. ISSE 2012: 180-194 - 2011
- [c2]Dominik Merli, Dieter Schuster, Frederic Stumpf, Georg Sigl:
Side-Channel Analysis of PUFs and Fuzzy Extractors. TRUST 2011: 33-47 - 2010
- [c1]Dominik Merli, Frederic Stumpf, Claudia Eckert:
Improving the quality of ring oscillator PUFs on FPGAs. WESS 2010: 9
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-04 21:23 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint