PEOPLE
BLOG
NEWS
PUBLICATIONS
PARTNERS
SPONSORS
CONTACT
 
 
 
 
PUBLICATIONS

Entropy Extraction in Metastability-based TRNG.
by Vikram Suresh, Wayne Burleson.
In Proceedings of IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), Anaheim, 2010.
[PDF]

A Hybrid Self-calibration Technique to Mitigate the Effect of Variability in TRNG.
by Vikram Suresh, Wayne Burleson.
In 2nd European Workshop on Variability, VARI, Grenoble, France, 2011.
[PDF]

Invited Talk: Physical layer Security and Privacy with Ultra-Wideband.
by Wayne Burleson.
IEEE Symposium on Medical Information and Communication Technology (ISMICT) 2011, Montreux, Switzerland, March 2011.
[PDF slides]

Hardware emulation of a secure passive RFID sensor system.
by Michael Todd.
Masters thesis, University of Massachusetts Amherst, September 2010.
[PDF]

Low-Power Sub-threshold Design of Secure Physical Unclonable Functions.
by Lang Lin, Dan Holcomb, Dilip Kumar Krishnappa, Prasad Shabadi, Wayne Burleson.
In Proceedings of ACM/IEEE International Symposium on Low Power Electronics and Design (ISLPED), Austin, August 2010.
[PDF] [PDF slides]

On the limits of effective micro-energy harvesting on mobile CRFID sensors.
by Jeremy Gummeson, Shane S. Clark, Kevin Fu, Deepak Ganesan.
In Proceedings of 8th Annual ACM/USENIX International Conference on Mobile Systems, Applications, and Services (MobiSys), June 2010.
[PDF]

Evaluating a new MAC for current and next generation RFID.
by Serge Zhilyaev.
Masters thesis, University of Massachusetts Amherst, February 2010.
[PDF]

MOLES: Malicious Off-chip Leakage Enabled by Side-channels.
by Lang Lin, Wayne Burleson, Christof Paar.
In Proceedings of ACM/IEEE International Conference on Computer-Aided Design (ICCAD), November 2009.
[PDF] [PDF slides]

Towards autonomously-powered CRFIDs.
by Shane S. Clark, Jeremy Gummeson, Kevin Fu, and Deepak Ganesan.
To appear in Workshop on Power Aware Computing and Systems (HotPower 2009), October 2009.
[PDF]

Trojan side-channels: lightweight hardware Trojans through side-channel engineering.
by Lang Lin, Markus Kasper, Tim Guneysu, Christof Paar, Wayne Burleson.
In Workshop on Cryptographic Hardware and Embedded Systems (CHES), September 2009.
[PDF]

Analysis and Mitigation of Process Variation Impacts on Power-Attack Tolerance.
by Lang Lin, Wayne Burleson.
In Proceedings of ACM/IEEE Design Automation Conference, July 2009.
[PDF][slides]

Power-up SRAM state as an identifying fingerprint and source of true random numbers.
by Daniel E. Holcomb, Wayne P. Burleson, and Kevin Fu.
In IEEE Transactions on Computers, 58(9):1198-1210, September 2009.
[PDF]

Physical-layer Identification of RFID Devices
by Boris Danev, Thomas S. Heydt-Benjamin, Srdjan Capkun.
To appear in Proceedings of the 18th USENIX Security Symposium, Montreal, Canada, August 2009.
[PDF]

CCCP: Secure remote storage for computational RFIDs.
by Mastooreh Salajegheh, Shane Clark, Benjamin Ransford, Kevin Fu, and Ari Juels.
In Proceedings of the 18th USENIX Security Symposium, Montreal, Canada, August 2009.
[PDF]

Getting things done on computational RFIDs with energy-aware checkpointing and voltage-aware scheduling.
by Benjamin Ransford, Shane Clark, Mastooreh Salajegheh, and Kevin Fu.
In Proceedings of USENIX Workshop on Power Aware Computing and Systems (HotPower), December 2008.
[PDF]

Electromagnetic interference (EMI) of implanted cardiac devices by MP3 player headphones.
by Sinjin Lee, Benjamin Ransford, Kevin Fu, Tadayoshi Kohno, and William H. Maisel.
In Circulation, 118(18 Supplement), November 2008. Abstract 662, 2008 American Heart Association Annual Scientific Sessions.
[Abstract]

Absence makes the heart grow fonder: New directions for implantable medical device security.
by Tamara Denning, Kevin Fu, and Tadayoshi Kohno.
In Proceedings of USENIX Workshop on Hot Topics in Security (HotSec), July 2008.
[PDF]

Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses.
by Daniel Halperin, Thomas S. Heydt-Benjamin, Benjamin Ransford, Shane S. Clark, Benessa Defend, Will Morgan, Kevin Fu, Tadayoshi Kohno, and William H. Maisel.
In Proceedings of the 29th Annual IEEE Symposium on Security and Privacy, May 2008.
Outstanding Paper Award
[PDF] [FAQ]

Leakage-Based Differential Power Analysis (LDPA) on Sub-90nm CMOS Cryptosystems.
by Lang Lin and Wayne Burleson.
In IEEE International Symposium on Circuits and Systems (ISCAS), May 2008.
[PDF]

Unidirectional Key Distribution Across Time and Space with Applications to RFID Security.
by Ari Juels, Bryan Parno, and Ravikanth Pappu.
In Proceedings of USENIX Security Symposium, August 2008.
[HTML]

Researchers Say Sharing Is the Key to Privacy for EPC Tags.
by Mary Catherine O'Connor.
RFID Journal, February 14, 2008.
[HTML]

An Interview with RFID Security Expert Ari Juels.
by Tadayoshi Kohno.
In IEEE Pervasive Computing, vol. 7, no. 1, 2008, pp. 10-11.
[HTML]

Security and privacy for implantable medical devices.
by Daniel Halperin, Thomas S. Heydt-Benjamin, Kevin Fu, Tadayoshi Kohno, and William H. Maisel.
In IEEE Pervasive Computing, Special Issue on Implantable Electronics, January 2008.
[PDF]

Covert Channels in Privacy-Preserving Identification Systems.
by Dan Bailey, Dan Boneh, Eu-Jin Goh, and Ari Juels.
In Proceedings of ACM CCS ’07, November, 2007, pp. 584-597.
[HTML]

Randomness in Integrated Circuits with Applications in Device Identification and Random Number Generation.
by Daniel E. Holcomb.
Masters Thesis, Department of Electrical and Computer Engineering, University of Massachusetts Amherst. August, 2007.
[PDF]

The Vision of Secure RFID.
by Ari Juels.
In Proceedings of the IEEE 95(8): 1507-1508. August, 2007.
[HTML]

Defining Strong Privacy for RFID. Extended abstract.
by Ari Juels and Stephen Weis.
In PerTec ’07, pp. 342-347.
[HTML]

Maximalist cryptography and computation on the WISP UHF RFID tag.
by Hee-Jin Chae, Daniel J. Yeager, Joshua R. Smith, and Kevin Fu.
In Proceedings of the Conference on RFID Security, July 2007.
[PDF] [Slides] [Conference]

Initial SRAM state as a fingerprint and source of true random numbers for RFID tags.
by Daniel E. Holcomb, Wayne P. Burleson, and Kevin Fu.
In Proceedings of the Conference on RFID Security, July 2007.
[PDF] [Slides] [Demo] [Conference]

Cryptanalysis of two lightweight RFID authentication schemes.
by Benessa Defend, Kevin Fu, and Ari Juels.
In Fourth IEEE International Workshop on Pervasive Computing and Communication Security (PerSec) Workshop, March 2007.
[PDF]
[Slides] [Conference]

Shoehorning Security into the EPC Standard.
by Daniel Bailey and Ari Juels.
In SCN '06, pp. 303-320.
[PDF]

Vulnerabilities in first-generation RFID-enabled credit cards.
by Thomas S. Heydt-Benjamin, Dan V. Bailey, Kevin Fu, Ari Juels, and Tom O'Hare.
In Proc. of Eleventh International Conference on Financial Cryptography and Data Security, Lowlands, Scarborough, Trinidad/Tobago, February 2007.
[PDF] [Slides] [Demo] [Conference] [News]

The Security Implications of VeriChip Cloning.
by J. Halamka, A. Juels, A. Stubblefield, and J. Westhues.
In Journal of the American Medical Informatics Association, 13(6):601-607, November 2006.
[PDF]

Collaborative monitors of embedded system security.
by Tilman Wolf, Shufu Mao, Dhruv Kumar, Basab Datta, Wayne Burleson, and Guy Gogniat.
In Proc. of First International Workshop on Embedded Systems Security in conjunction with 6th Annual ACM International Conference on Embedded Software, Seoul, Korea, October 2006.
[PDF]

Privacy for public transportation.
by Thomas S. Heydt-Benjamin, Hee-Jin Chae, Benessa Defend, and Kevin Fu.
In Proceedings of Privacy Enhancing Technologies workshop (PET 2006), June 2006.
[PDF]

IPsec implementation project using FPGA and microcontroller.
by Guy Gogniat, Wayne Burleson, Mike O'Malley, and Lilian Bossuet.
In IEEE International Workshop on Reconfigurable Computing Education, March 2006.
[PDF]

RFID security and privacy: A research survey.
by A. Juels.
In IEEE Journal on Selected Areas in Communications, 24(2):381--394, February 2006.
[PDF]

Reconfigurable security architecture for embedded systems.
by Guy Gogniat, Tilman Wolf, and Wayne Burleson.
In Proceedings of the 39th Hawaii International Conference on System Sciences, January 2006.

RFID privacy: An overview of problems and proposed solutions.
by S. Garfinkel, A. Juels, and R. Pappu.
In IEEE Security and Privacy, 3(3):34--43, May/June 2005.

Security analysis of a cryptographically-enabled RFID device.
by S. Bono, M. Green, A. Stubblefield, A. Juels, A. Rubin, and M. Szydlo.
In P. McDaniel, editor, 14th USENIX Security Symposium, pages 1--16. USENIX, 2005.
[HTML]

Security and privacy issues in e-passports.
by A. Juels, D. Molnar, and D. Wagner.
In D. Gollman, G. Li, and G. Tsudik, editors, IEEE/CreateNet SecureComm. IEEE, 2005.

Authenticating pervasive devices with human protocols.
by A. Juels and S. Weis.
In Advances in Cryptology ­ CRYPTO 2005, pages 293--308. Springer-Verlag, 2005. Lecture Notes in Computer Science, Volume 3621.

Strengthening EPC tags against cloning.
by A. Juels.
In ACM Workshop on Wireless Security (WiSe). ACM Press, 2005.

Defining strong privacy for RFID.
by A. Juels and S. Weis.
Manuscript, 2005.

High-power proxies for enhancing RFID privacy and utility.
by A. Juels, P. Syverson, and D. Bailey.
In G. Danezis and D. Martin, editors, Privacy Enhancing Technologies (PET), 2005.

RFID privacy: A technical primer for the non-technical reader.
by A. Juels.
In K. Strandburg and D.S. Raicu, editors, Privacy and Technologies of Identity: A Cross-Disciplinary Conversation. Springer-Verlag, 2005.

Technological approaches to the RFID privacy problem.
by A. Juels.
In S. Garfinkel and B. Rosenberg, editors, RFID: Applications, Security, and Privacy. Addison-Wesley, 2005.

Reconfigurable security primitive for embedded systems.
by G. Gogniat, T. Wolf, and Wayne Burleson.
In Proceedings of International Symposium on System-on-Chip, pages 23-28, Tampere, Finland, November 2005.

An energy-aware active smart card.
by R Tessier, D. Jasinski, A. Maheshwari, A. Natarajan, Weifeng Xu, and Wayne Burleson.
In IEEE Transactions on VLSI Systems, 13(10):1190-1199, October 2005.

Configurable computing for high-security/high-performance ambient systems.
by Guy Gogniat, Lilian Bossuet, and Wayne Burleson.
In Embedded Computer Systems: Architectures, Modeling, and Simulation, volume 3553, pages 72-81. Springer Berlin / Heidelberg, July 2005.

A bit of privacy.
by A. Juels.
In RFID Journal, May 2005.

Attack on a cryptographic RFID device.
by A. Juels.
In RFID Journal, February 2005.

`Yoking-proofs' for RFID tags.
by A. Juels.
In R. Sandhu and R. Thomas, editors, Workshop on Pervasive Computing and Communications Security ­ PerSec 2004, pages 138--143. IEEE Computer Society, 2004.

Minimalist cryptography for low-cost RFID tags.
by A. Juels.
In C. Blundo and S. Cimato, editors, The Fourth International Conference on Security in Communication Networks ­ SCN 2004, volume 3352 of Lecture Notes in Computer Science, pages 149--164. Springer-Verlag, 2004.

Soft blocking: Flexible blocker tags on the cheap.
by A. Juels and J. Brainard.
In S. De Capitani di Vimercati and P. Syverson, editors, Workshop on Privacy in the Electronic Society ­ WPES, pages 1--7. ACM, ACM Press, 2004.

Universal re-encryption for mixnets.
by P. Golle, M. Jakobsson, A. Juels, and P. Syverson.
In T. Okamoto, editor, RSA Conference - Cryptographers' Track (CT-RSA), volume 2964 of Lecture Notes in Computer Science, pages 163--178, 2004.

Dynamically configurable security for SRAM FPGA bitstreams.
by L. Bossuet, G. Gogniat, and Wayne Burleson.
In Proceedings of the 18th International Parallel and Distributed Processing Symposium, page 146, April 2004. (International Journal of Embedded Systems, From Inderscience Publishers issue 5/6, 2005).

The blocker tag: Selective blocking of RFID tags for consumer privacy.
by A. Juels, R.L. Rivest, and M. Szydlo.
In V. Atluri, editor, 8th ACM Conference on Computer and Communications Security, pages 103-111. ACM Press, 2003.

Squealing Euros: Privacy protection in RFID-enabled banknotes.
by A. Juels and R. Pappu.
In R. Wright, editor, Financial Cryptography '03, volume 2742 of Lecture Notes in Computer Science, pages 103--121. Springer-Verlag, 2003.

VLSI array algorithms and architectures for RSA modular multiplication.
by Yong-Jin Jeong and Wayne Burleson.
In IEEE Transactions on VLSI systems, 5:211-217, June 1997.

TALKS

Panel: MITRE Privacy Technical Exchange Panel: RFID Privacy.
by Kevin Fu.
June 2007.

Invited Talk: Data Security Risks: RFID Lab Research.
by Kevin Fu.
In Boston Federal Reserve Bank, Emerging Payments Research Group, May 2007.
[PDFs]

Panel: Ubiquitous Computing in the Retail Store of the Future,
17th Annual Computers, Freedom and Privacy Conference (CFP2007).

by Kevin Fu.
May 2007.
[PDF]

Panel: Wireless ID Issues: Privacy, Efficiency and Security.
by Kevin Fu.
In Dartmouth College Centers Forum on Freedom and Technology, April 2007.
[HTML]

Invited talk: Vulnerabilities in First-Generation RFID-Enabled Credit Cards.
by Kevin Fu.
In Berkeley TRUST seminar, March 2007.
[PDF]

Panel: RFID: How Can Security and Privacy be Built into the Technology.
by Kevin Fu.
In RFID and Ubiquitous Computing, Trans Atlantic Consumer Dialog (TACD), Brussels, Belgium, March 2007.
[PDF]

Panel: RFID Security and Privacy.
by Kevin Fu.
In Financial Cryptography, February 2007.
[HTML]

Computer system security and medical devices.
by Kevin Fu.
In U.S. Food and Drug Administration Center for Devices and Radiological Health (FDA CDRH), October 2006.
[PDF]

RFID security and privacy.
by Kevin Fu, Ari Juels, and Adam Stubblefield.
In USENIX Security Tutorial, August 2006.
[PDFs]

Special topics in RFID security.
by Kevin Fu.
In TU Graz RFID Summer School, July 2006.
[HTML]

Building RFID applications with security and privacy.
by Kevin Fu.
In Workshop on RFID Security, July 2006.
[PDF]

Demonstration of an RFID-enabled espresso machine.
by Hee-Jin Chae, Benessa Defend, and Kevin Fu.
In MIT RFID Academic Convocation, January 2006.

 
     
COPYRIGHT © 2010 RFID CUSP. This page is maintained by the RFID Consortium for Security and Privacy.