default search action
Steffen Becker 0003
Person information
- affiliation: Ruhr-University Bochum, Institute for IT Security, Bochum, Germany
Other persons with the same name
- Steffen Becker 0001 — University of Stuttgart, Germany (and 2 more)
- Steffen Becker 0002 — TU Ilmenau, Germany
- Steffen Becker 0004 — University of Tasmania, Hobart, Australia
- Steffen Becker 0005 — Nanoplus Nanosystems and Technologies GmbH, Gerbrunn, Germany (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c13]Endres Puschner, Maik Ender, Steffen Becker, Christof Paar:
Patching FPGAs: The Security Implications of Bitstream Modifications. ASHES@CCS 2024: 89-99 - [c12]René Walendy, Markus Weber, Jingjie Li, Steffen Becker, Carina Wiesen, Malte Elson, Younghyun Kim, Kassem Fawaz, Nikol Rummel, Christof Paar:
I see an IC: A Mixed-Methods Approach to Study Human Problem-Solving Processes in Hardware Reverse Engineering. CHI 2024: 831:1-831:20 - [c11]Timo Speith, Julian Speith, Steffen Becker, Yixin Zou, Asia Biega, Christof Paar:
Explainability as a Requirement for Hardware: Introducing Explainable Hardware (XHW). RE 2024: 354-362 - [c10]Franziska Herbert, Steffen Becker, Annalina Buckmann, Marvin Kowalewski, Jonas Hielscher, Yasemin Acar, Markus Dürmuth, Yixin Zou, M. Angela Sasse:
Digital Security - A Question of Perspective A Large-Scale Telephone Survey with Four At-Risk User Groups. SP 2024: 697-716 - [i16]René Walendy, Markus Weber, Jingjie Li, Steffen Becker, Carina Wiesen, Malte Elson, Younghyun Kim, Kassem Fawaz, Nikol Rummel, Christof Paar:
I see an IC: A Mixed-Methods Approach to Study Human Problem-Solving Processes in Hardware Reverse Engineering. CoRR abs/2402.15452 (2024) - [i15]Elisabeth Kirsten, Annalina Buckmann, Abraham Mhaidli, Steffen Becker:
Decoding Complexity: Exploring Human-AI Concordance in Qualitative Coding. CoRR abs/2403.06607 (2024) - [i14]René Walendy, Markus Weber, Steffen Becker, Christof Paar, Nikol Rummel:
An Evidence-Based Curriculum Initiative for Hardware Reverse Engineering Education. CoRR abs/2411.05588 (2024) - [i13]Endres Puschner, Maik Ender, Steffen Becker, Christof Paar:
Patching FPGAs: The Security Implications of Bitstream Modifications. CoRR abs/2411.11060 (2024) - 2023
- [j4]Marvin Kowalewski, Christine Utz, Martin Degeling, Theodor Schnitzler, Franziska Herbert, Leonie Schaewitz, Florian M. Farke, Steffen Becker, Markus Dürmuth:
52 Weeks Later: Attitudes Towards COVID-19 Apps for Different Purposes Over Time. Proc. ACM Hum. Comput. Interact. 7(CSCW2): 1-45 (2023) - [j3]Carina Wiesen, Steffen Becker, René Walendy, Christof Paar, Nikol Rummel:
The Anatomy of Hardware Reverse Engineering: An Exploration of Human Factors During Problem Solving. ACM Trans. Comput. Hum. Interact. 30(4): 62:1-62:44 (2023) - [c9]Nils Rothaug, Simon Klix, Nicole Auth, Sinan Böcker, Endres Puschner, Steffen Becker, Christof Paar:
Towards Unsupervised SEM Image Segmentation for IC Layout Extraction. ASHES@CCS 2023: 123-128 - [c8]Franziska Herbert, Steffen Becker, Leonie Schaewitz, Jonas Hielscher, Marvin Kowalewski, M. Angela Sasse, Yasemin Acar, Markus Dürmuth:
A World Full of Privacy and Security (Mis)conceptions? Findings of a Representative Survey in 12 Countries. CHI 2023: 582:1-582:23 - [c7]Endres Puschner, Thorben Moos, Steffen Becker, Christian Kison, Amir Moradi, Christof Paar:
Red Team vs. Blue Team: A Real-World Hardware Trojan Detection Case Study Across Four Modern CMOS Technology Generations. SP 2023: 56-74 - [i12]Timo Speith, Julian Speith, Steffen Becker, Yixin Zou, Asia Biega, Christof Paar:
Expanding Explainability: From Explainable Artificial Intelligence to Explainable Hardware. CoRR abs/2302.14661 (2023) - [i11]Marvin Kowalewski, Christine Utz, Martin Degeling, Theodor Schnitzler, Franziska Herbert, Leonie Schaewitz, Florian M. Farke, Steffen Becker, Markus Dürmuth:
52 Weeks Later: Attitudes Towards COVID-19 Apps for Different Purposes Over Time. CoRR abs/2307.06214 (2023) - [i10]Steffen Becker, Carina Wiesen, René Walendy, Nikol Rummel, Christof Paar:
REVERSIM: A Game-Based Approach to Accessing Large Populations for Studying Human Aspects in Hardware Reverse Engineering. CoRR abs/2309.05740 (2023) - 2022
- [b1]Steffen Becker:
Human factors in hardware reverse engineering. Ruhr University Bochum, Germany, 2022 - [i9]Franziska Herbert, Steffen Becker, Leonie Schaewitz, Jonas Hielscher, Marvin Kowalewski, M. Angela Sasse, Yasemin Acar, Markus Dürmuth:
A World Full of Privacy and Security (Mis)conceptions? Findings of a Representative Survey in 12 Countries. CoRR abs/2212.10382 (2022) - [i8]Franziska Herbert, Steffen Becker, Annalina Buckmann, Marvin Kowalewski, Jonas Hielscher, Leonie Schaewitz, Jennifer Friedauer, Yasemin Acar, Markus Dürmuth, M. Angela Sasse:
Talking to the Overlooked: A Nationwide Telephone Survey with Four Groups Under-represented in Privacy and Security Studies. CoRR abs/2212.12964 (2022) - [i7]Endres Puschner, Thorben Moos, Steffen Becker, Christian Kison, Amir Moradi, Christof Paar:
Red Team vs. Blue Team: A Real-World Hardware Trojan Detection Case Study Across Four Modern CMOS Technology Generations. IACR Cryptol. ePrint Arch. 2022: 1720 (2022) - 2021
- [c6]Christine Utz, Steffen Becker, Theodor Schnitzler, Florian M. Farke, Franziska Herbert, Leonie Schaewitz, Martin Degeling, Markus Dürmuth:
Apps Against the Spread: Privacy Implications and User Acceptance of COVID-19-Related Smartphone Apps on Three Continents. CHI 2021: 70:1-70:22 - [i6]Carina Wiesen, Steffen Becker, Nils Albartus, Christof Paar, Nikol Rummel:
Promoting the Acquisition of Hardware Reverse Engineering Skills. CoRR abs/2105.13725 (2021) - [i5]Steffen Becker, Carina Wiesen, Nils Albartus, Nikol Rummel, Christof Paar:
An Exploratory Study of Hardware Reverse Engineering Technical and Cognitive Processes. CoRR abs/2105.14943 (2021) - 2020
- [j2]Julian Speith, Steffen Becker, Maik Ender, Endres Puschner, Christof Paar:
Hardware-Trojaner. Datenschutz und Datensicherheit 44(7): 446-450 (2020) - [c5]Steffen Becker, Carina Wiesen, Nils Albartus, Nikol Rummel, Christof Paar:
An Exploratory Study of Hardware Reverse Engineering - Technical and Cognitive Processes. SOUPS @ USENIX Security Symposium 2020: 285-300 - [i4]Christine Utz, Steffen Becker, Theodor Schnitzler, Florian M. Farke, Franziska Herbert, Leonie Schaewitz, Martin Degeling, Markus Dürmuth:
Apps Against the Spread: Privacy Implications and User Acceptance of COVID-19-Related Smartphone Apps on Three Continents. CoRR abs/2010.14245 (2020)
2010 – 2019
- 2019
- [j1]Steffen Becker, Carina Wiesen, Christof Paar, Nikol Rummel:
Wie arbeiten Reverse Engineers? Datenschutz und Datensicherheit 43(11): 686-690 (2019) - [c4]Carina Wiesen, Nils Albartus, Max Hoffmann, Steffen Becker, Sebastian Wallat, Marc Fyrbiak, Nikol Rummel, Christof Paar:
Towards cognitive obfuscation: impeding hardware reverse engineering based on psychological insights. ASP-DAC 2019: 104-111 - [c3]Sebastian Wallat, Nils Albartus, Steffen Becker, Max Hoffmann, Maik Ender, Marc Fyrbiak, Adrian Drees, Sebastian Maaßen, Christof Paar:
Highway to HAL: open-sourcing the first extendable gate-level netlist reverse engineering framework. CF 2019: 392-397 - [c2]Carina Wiesen, Steffen Becker, Nils Albartus, Christof Paar, Nikol Rummel:
Promoting the Acquisition of Hardware Reverse Engineering Skills. FIE 2019: 1-9 - [i3]Carina Wiesen, Steffen Becker, Marc Fyrbiak, Nils Albartus, Malte Elson, Nikol Rummel, Christof Paar:
Teaching Hardware Reverse Engineering: Educational Guidelines and Practical Insights. CoRR abs/1910.00312 (2019) - [i2]Carina Wiesen, Nils Albartus, Max Hoffmann, Steffen Becker, Sebastian Wallat, Marc Fyrbiak, Nikol Rummel, Christof Paar:
Towards Cognitive Obfuscation: Impeding Hardware Reverse Engineering Based on Psychological Insights. CoRR abs/1910.00323 (2019) - [i1]Sebastian Wallat, Nils Albartus, Steffen Becker, Max Hoffmann, Maik Ender, Marc Fyrbiak, Adrian Drees, Sebastian Maaßen, Christof Paar:
Highway to HAL: Open-Sourcing the First Extendable Gate-Level Netlist Reverse Engineering Framework. CoRR abs/1910.00350 (2019) - 2018
- [c1]Carina Wiesen, Steffen Becker, Marc Fyrbiak, Nils Albartus, Malte Elson, Nikol Rummel, Christof Paar:
Teaching Hardware Reverse Engineering: Educational Guidelines and Practical Insights. TALE 2018: 438-445
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:06 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint