Markus Kuhn (computer scientist): Difference between revisions
Omnipaedista (talk | contribs) date information sourced from VIAF data |
m Disambiguating links to Tempest (link changed to Tempest (codename)) using DisamAssist. |
||
(33 intermediate revisions by 28 users not shown) | |||
Line 1: | Line 1: | ||
{{short description|German computer scientist}} |
|||
{{EngvarB|date=February 2018}} |
|||
{{Use dmy dates|date=February 2018}} |
|||
{{Infobox scientist |
{{Infobox scientist |
||
| name = Markus Guenther Kuhn |
| name = Markus Kuhn |
||
| birth_name = Markus Guenther Kuhn |
|||
| image = <!--(as myimage.jpg, no 'File:')--> |
| image = <!--(as myimage.jpg, no 'File:')--> |
||
| image_size = |
| image_size = |
||
| alt = |
| alt = |
||
| caption = |
| caption = |
||
| birth_date = {{Birth year and age|1971}}< |
| birth_date = {{Birth year and age|1971}}<ref>References |
||
Kuhn, M. (1971, January 1). Retrieved from [https://www.cl.cam.ac.uk/~mgk25/kuhn-da.pdf Sicherheitsanalyse eines Mikroprozessors mit Busverschlusselun]</ref> |
|||
| birth_place = [[Munich]], [[West Germany]]<!--http://en.wikipedia.org/enwiki/w/index.php?title=Markus_Kuhn_%28computer_scientist%29&diff=10194488&oldid=8306295--> |
| birth_place = [[Munich]], [[West Germany]]<!--http://en.wikipedia.org/enwiki/w/index.php?title=Markus_Kuhn_%28computer_scientist%29&diff=10194488&oldid=8306295--> |
||
| death_date = <!-- {{Death date and age|YYYY|MM|DD|YYYY|MM|DD}} (death date then birth date) --> |
| death_date = <!-- {{Death date and age|df=y|YYYY|MM|DD|YYYY|MM|DD}} (death date then birth date) --> |
||
| death_place = |
| death_place = |
||
| residence = |
| residence = |
||
| citizenship = |
| citizenship = |
||
| nationality = |
| nationality = |
||
| fields = [[Computer science]]<br>[[Computer security]]<br>[[Tamper resistance]]<ref> |
| fields = [[Computer science]]<br>[[Computer security]]<br>[[Tamper resistance]]<ref name="acm">{{ACMPortal|id=81100443754}}</ref> |
||
<ref>{{Cite journal | last1 = Kuhn | first1 = M. G. | title = Cipher instruction search attack on the bus-encryption security microcontroller DS5002FP | doi = 10.1109/12.729797 | journal = IEEE Transactions on Computers | volume = 47 | issue = 10 | pages = 1153–1157 | year = 1998 }}</ref><ref name="Kuhn2002">{{Cite book | last1 = Kuhn | first1 = M. G. | chapter = Optical time-domain eavesdropping risks of CRT displays | doi = 10.1109/SECPRI.2002.1004358 | title = Proceedings 2002 IEEE Symposium on Security and Privacy | pages = 3–4 | year = 2002 | isbn = 978-0-7695-1543-4 | citeseerx = 10.1.1.7.5870 | s2cid = 2385507 }}</ref><ref>{{Cite book | last1 = Hancke | first1 = G. P. | last2 = Kuhn | first2 = M. G. | doi = 10.1109/SECURECOMM.2005.56 | chapter = An RFID Distance Bounding Protocol | title = First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05) | pages = 67 | year = 2005 | isbn = 978-0-7695-2369-9 | s2cid = 435025 }}</ref><ref>{{Cite journal | last1 = Petitcolas | first1 = F. A. P. | last2 = Anderson | first2 = R. J. | last3 = Kuhn | first3 = M. G. | doi = 10.1109/5.771065 | title = Information hiding-a survey | journal = Proceedings of the IEEE | volume = 87 | issue = 7 | pages = 1062 | year = 1999 | citeseerx = 10.1.1.333.9397 }}</ref><ref>{{Cite book | last1 = Kuhn | first1 = M. G. | chapter = Compromising emanations of LCD TV sets | doi = 10.1109/ISEMC.2011.6038442 | title = 2011 IEEE International Symposium on Electromagnetic Compatibility | pages = 931–936 | year = 2011 | isbn = 978-1-4577-0812-1 | s2cid = 47153474 }}</ref> |
|||
<ref>{{cite doi|10.1109/12.729797}}</ref><ref>{{cite doi|10.1109/SECPRI.2002.1004358}}</ref><ref>{{cite doi|10.1109/SECURECOMM.2005.56}}</ref><ref>{{cite doi|10.1109/5.771065}}</ref><ref>{{cite doi|10.1109/ISEMC.2011.6038442}}</ref> |
|||
| workplaces = [[University of Cambridge]] |
| workplaces = {{Plainlist| |
||
* [[University of Cambridge]] |
|||
* [[Purdue University]] |
|||
* [[University of Erlangen-Nuremberg]]}} |
|||
| alma_mater = [[University of Erlangen-Nuremberg]] |
| alma_mater = {{Plainlist| |
||
* [[University of Erlangen-Nuremberg]] |
|||
* [[Purdue University]] |
|||
* [[Wolfson College, Cambridge]]}} |
|||
| thesis_title = Compromising emanations: eavesdropping risks of computer displays |
| thesis_title = Compromising emanations: eavesdropping risks of computer displays |
||
| thesis_url = http://ulmss-newton.lib.cam.ac.uk/vwebv/holdingsInfo?bibId=24253 |
| thesis_url = http://ulmss-newton.lib.cam.ac.uk/vwebv/holdingsInfo?bibId=24253 |
||
Line 21: | Line 32: | ||
| doctoral_advisor = [[Ross J. Anderson]]<ref name="mathgene">{{MathGenealogy|id=161231}}</ref> |
| doctoral_advisor = [[Ross J. Anderson]]<ref name="mathgene">{{MathGenealogy|id=161231}}</ref> |
||
| academic_advisors = |
| academic_advisors = |
||
| doctoral_students = [[Steven Murdoch]]<ref name="murdochphd">{{cite thesis |degree=PhD |first=Steven James|last=Murdoch |title=Covert channel vulnerabilities in anonymity systems |publisher=University of Cambridge |year=2008 |url=http://ulmss-newton.lib.cam.ac.uk/vwebv/holdingsInfo?bibId=30158}}</ref> |
|||
| doctoral_students = Saar Drimer<ref>{{cite doi|10.1007/978-3-642-00641-8_8}}</ref><br>Gerhard Hancke<ref>{{cite doi|10.1145/1352533.1352566}}</ref><br>Andrew Lewis<br>Steven Murdoch<br>Piotr Zieliński<ref name="mathgene"/> |
|||
| notable_students = |
| notable_students = |
||
| known_for = [[EURion constellation]] |
| known_for = [[EURion constellation]] |
||
Line 31: | Line 42: | ||
| signature = <!--(filename only)--> |
| signature = <!--(filename only)--> |
||
| signature_alt = |
| signature_alt = |
||
| website = {{URL| |
| website = {{URL|https://www.cl.cam.ac.uk/~mgk25/}} |
||
| footnotes = |
| footnotes = |
||
| spouse = |
| spouse = |
||
| children = |
| children = |
||
}} |
}} |
||
'''Markus Guenther Kuhn''' (born 1971) is a |
'''Markus Guenther Kuhn''' (born 1971) is a German [[computer scientist]], currently working at the [[Computer Laboratory, University of Cambridge]] and a fellow of [[Wolfson College, Cambridge]].<ref>[http://www.cl.cam.ac.uk/DeptInfo/Overview/ The Blue Book] – "The Computer Laboratory: an Introduction", University of Cambridge Computer Laboratory, Oct 2006 {{webarchive |url=https://web.archive.org/web/20070204065322/http://www.cl.cam.ac.uk/DeptInfo/Overview/ |date=4 February 2007 }}</ref><ref name="googlescholar">{{GoogleScholar|4FSAZOsAAAAJ}}</ref><ref name="microsoft">{{AcademicSearch|1399760}}</ref><ref name="dblp">{{DBLP|name=Markus G. Kuhn}}</ref><ref name="scopus">{{Scopus|id=8900011300}}</ref> |
||
==Education== |
==Education== |
||
Kuhn was educated at [[University of Erlangen-Nuremberg|University of Erlangen]] ( |
Kuhn was educated at [[University of Erlangen-Nuremberg|University of Erlangen]] (Germany), he received his Master of Science degree at [[Purdue University]] and PhD at the [[University of Cambridge]]. |
||
==Research== |
==Research== |
||
Kuhn's main research interests include [[computer security]], in particular the hardware and signal-processing aspects of it, and [[distributed system]]s. He is known, among other things, for his work on [[Secure cryptoprocessor|security microcontrollers]], [[ |
Kuhn's main research interests include [[computer security]], in particular the hardware and signal-processing aspects of it, and [[distributed system]]s. He is known, among other things, for his work on [[Secure cryptoprocessor|security microcontrollers]], [[Tempest (codename)|compromising emanations]], and [[distance-bounding protocol]]s. He developed the Stirmark test for [[digital watermarking]] schemes, the [[OTPW]] one-time password system, and headed the project that extended the [[X11]] [[misc-fixed]] fonts to [[Unicode]]. |
||
In 1994, as an undergraduate student, he became known for developing several ways to circumvent the [[VideoCrypt]] encryption system, most notably the ''Season7'' smartcard emulator.<ref>{{Cite web | title=MS-DOS Videocrypt smart card emulator | url=http://www.textfiles.com/hacking/CABLE/season7.txt | date=19 June 1994 | first=Markus | last=Kuhn }}</ref> |
|||
In 2002, he published a new method for eavesdropping CRT screens<ref name="Kuhn2002" /> and in 2003 he went on to publish mitigations such as "Tempest fonts".<ref>{{cite journal |last= Kuhn |first= Markus G. |author-link= Markus Kuhn (computer scientist) |date=December 2003|title= Compromising emanations: eavesdropping risks of computer displays |journal=Technical Report |issue= 577|publisher= University of Cambridge Computer Laboratory |location= Cambridge, United Kingdom |issn= 1476-2986 |id= UCAM-CL-TR-577 |url= http://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-577.pdf |access-date= 2010-10-29}}</ref> |
|||
In 2002, he published a new method for eavesdropping CRT screens.<ref>{{cite doi|10.1109/SECPRI.2002.1004358}}</ref> |
|||
In 2010 Kuhn was asked to |
In 2010, Kuhn was asked to analyse the [[ADE 651]], a device used in Iraq that was said to be a bomb-detecting device; he found that it contained nothing but an anti-theft tag and said that it was "impossible" that the device could detect anything whatsoever.<ref>{{cite news |work=BBC News|title=Iraq backing for 'bomb detector' |date=24 January 2010 |url=http://news.bbc.co.uk/2/low/middle_east/8477601.stm }}</ref> |
||
He is also known for some of his work on international |
He is also known for some of his work on international standardisation, such as pioneering the introduction of [[Unicode]]/[[UTF-8]] under [[Linux]].<ref>[http://www.cl.cam.ac.uk/~mgk25/unicode.html UTF-8 and Unicode FAQ for Unix/Linux]</ref> |
||
==Awards and honours== |
|||
In 1987 and 1988, he won the German national computer-science contest,<ref>P. Heyderhoff: Bundeswettbewerb Informatik. Informatik Spektrum, Vol. 11, pp. 107–108, Springer-Verlag, 1988</ref> and in 1989, he won a gold medal for the West German team at the [[International Olympiad in Informatics]].<ref>P. Heyderhoff: Informatik-Olympiade. Informatik Spektrum, Vol. 12, p. 235, Springer-Verlag, 1989</ref><ref>[http://www.oi.edu.pl/ioires/c_ioi89.html Results of the IOI 1989] {{webarchive|url=https://web.archive.org/web/20070628212422/http://www.oi.edu.pl/ioires/c_ioi89.html |date=28 June 2007 }}</ref> |
|||
==References== |
==References== |
||
{{reflist}} |
|||
<references/> |
|||
⚫ | |||
⚫ | |||
{{Persondata |
|||
|NAME=Kuhn, Markus G. |
|||
|ALTERNATIVE NAMES=Kuhn, Markus |
|||
|SHORT DESCRIPTION=German computer scientist |
|||
|DATE OF BIRTH=1971 |
|||
|PLACE OF BIRTH=[[Munich]] |
|||
|DATE OF DEATH= |
|||
|PLACE OF DEATH= |
|||
}} |
|||
{{DEFAULTSORT:Kuhn, Markus}} |
{{DEFAULTSORT:Kuhn, Markus}} |
||
[[Category:1971 births]] |
[[Category:1971 births]] |
||
Line 72: | Line 78: | ||
[[Category:Fellows of Wolfson College, Cambridge]] |
[[Category:Fellows of Wolfson College, Cambridge]] |
||
[[Category:Members of the University of Cambridge Computer Laboratory]] |
[[Category:Members of the University of Cambridge Computer Laboratory]] |
||
[[Category: |
[[Category:Computer security academics]] |
||
[[Category:Studienstiftung alumni]] |
[[Category:Studienstiftung alumni]] |
||
[[Category:University of Erlangen-Nuremberg alumni]] |
[[Category:University of Erlangen-Nuremberg alumni]] |
||
[[Category: |
[[Category:Scientists from Munich]] |
||
[[Category:Alumni of the University of Cambridge]] |
[[Category:Alumni of the University of Cambridge]] |
Latest revision as of 00:43, 20 September 2023
Markus Kuhn | |
---|---|
Born | Markus Guenther Kuhn 1971 (age 52–53)[9] |
Alma mater | |
Known for | EURion constellation |
Scientific career | |
Fields | Computer science Computer security Tamper resistance[1] [2][3][4][5][6] |
Institutions | |
Thesis | Compromising emanations: eavesdropping risks of computer displays (2002) |
Doctoral advisor | Ross J. Anderson[7] |
Doctoral students | Steven Murdoch[8] |
Website | www |
Markus Guenther Kuhn (born 1971) is a German computer scientist, currently working at the Computer Laboratory, University of Cambridge and a fellow of Wolfson College, Cambridge.[10][11][12][13][14]
Education
[edit]Kuhn was educated at University of Erlangen (Germany), he received his Master of Science degree at Purdue University and PhD at the University of Cambridge.
Research
[edit]Kuhn's main research interests include computer security, in particular the hardware and signal-processing aspects of it, and distributed systems. He is known, among other things, for his work on security microcontrollers, compromising emanations, and distance-bounding protocols. He developed the Stirmark test for digital watermarking schemes, the OTPW one-time password system, and headed the project that extended the X11 misc-fixed fonts to Unicode.
In 1994, as an undergraduate student, he became known for developing several ways to circumvent the VideoCrypt encryption system, most notably the Season7 smartcard emulator.[15]
In 2002, he published a new method for eavesdropping CRT screens[3] and in 2003 he went on to publish mitigations such as "Tempest fonts".[16]
In 2010, Kuhn was asked to analyse the ADE 651, a device used in Iraq that was said to be a bomb-detecting device; he found that it contained nothing but an anti-theft tag and said that it was "impossible" that the device could detect anything whatsoever.[17]
He is also known for some of his work on international standardisation, such as pioneering the introduction of Unicode/UTF-8 under Linux.[18]
Awards and honours
[edit]In 1987 and 1988, he won the German national computer-science contest,[19] and in 1989, he won a gold medal for the West German team at the International Olympiad in Informatics.[20][21]
References
[edit]- ^ Markus Kuhn author profile page at the ACM Digital Library
- ^ Kuhn, M. G. (1998). "Cipher instruction search attack on the bus-encryption security microcontroller DS5002FP". IEEE Transactions on Computers. 47 (10): 1153–1157. doi:10.1109/12.729797.
- ^ a b Kuhn, M. G. (2002). "Optical time-domain eavesdropping risks of CRT displays". Proceedings 2002 IEEE Symposium on Security and Privacy. pp. 3–4. CiteSeerX 10.1.1.7.5870. doi:10.1109/SECPRI.2002.1004358. ISBN 978-0-7695-1543-4. S2CID 2385507.
- ^ Hancke, G. P.; Kuhn, M. G. (2005). "An RFID Distance Bounding Protocol". First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05). p. 67. doi:10.1109/SECURECOMM.2005.56. ISBN 978-0-7695-2369-9. S2CID 435025.
- ^ Petitcolas, F. A. P.; Anderson, R. J.; Kuhn, M. G. (1999). "Information hiding-a survey". Proceedings of the IEEE. 87 (7): 1062. CiteSeerX 10.1.1.333.9397. doi:10.1109/5.771065.
- ^ Kuhn, M. G. (2011). "Compromising emanations of LCD TV sets". 2011 IEEE International Symposium on Electromagnetic Compatibility. pp. 931–936. doi:10.1109/ISEMC.2011.6038442. ISBN 978-1-4577-0812-1. S2CID 47153474.
- ^ Markus Kuhn at the Mathematics Genealogy Project
- ^ Murdoch, Steven James (2008). Covert channel vulnerabilities in anonymity systems (PhD thesis). University of Cambridge.
- ^ References Kuhn, M. (1971, January 1). Retrieved from Sicherheitsanalyse eines Mikroprozessors mit Busverschlusselun
- ^ The Blue Book – "The Computer Laboratory: an Introduction", University of Cambridge Computer Laboratory, Oct 2006 Archived 4 February 2007 at the Wayback Machine
- ^ Markus Kuhn publications indexed by Google Scholar
- ^ Markus Kuhn publications indexed by Microsoft Academic
- ^ Markus G. Kuhn at DBLP Bibliography Server
- ^ Markus Kuhn's publications indexed by the Scopus bibliographic database. (subscription required)
- ^ Kuhn, Markus (19 June 1994). "MS-DOS Videocrypt smart card emulator".
- ^ Kuhn, Markus G. (December 2003). "Compromising emanations: eavesdropping risks of computer displays" (PDF). Technical Report (577). Cambridge, United Kingdom: University of Cambridge Computer Laboratory. ISSN 1476-2986. UCAM-CL-TR-577. Retrieved 29 October 2010.
- ^ "Iraq backing for 'bomb detector'". BBC News. 24 January 2010.
- ^ UTF-8 and Unicode FAQ for Unix/Linux
- ^ P. Heyderhoff: Bundeswettbewerb Informatik. Informatik Spektrum, Vol. 11, pp. 107–108, Springer-Verlag, 1988
- ^ P. Heyderhoff: Informatik-Olympiade. Informatik Spektrum, Vol. 12, p. 235, Springer-Verlag, 1989
- ^ Results of the IOI 1989 Archived 28 June 2007 at the Wayback Machine
- 1971 births
- Living people
- German computer scientists
- Purdue University alumni
- Fellows of Wolfson College, Cambridge
- Members of the University of Cambridge Computer Laboratory
- Computer security academics
- Studienstiftung alumni
- University of Erlangen-Nuremberg alumni
- Scientists from Munich
- Alumni of the University of Cambridge