Jump to content

Markus Kuhn (computer scientist): Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
date information sourced from VIAF data
m Disambiguating links to Tempest (link changed to Tempest (codename)) using DisamAssist.
 
(33 intermediate revisions by 28 users not shown)
Line 1: Line 1:
{{short description|German computer scientist}}
{{EngvarB|date=February 2018}}
{{Use dmy dates|date=February 2018}}
{{Infobox scientist
{{Infobox scientist
| name = Markus Guenther Kuhn
| name = Markus Kuhn
| birth_name = Markus Guenther Kuhn
| image = <!--(as myimage.jpg, no 'File:')-->
| image = <!--(as myimage.jpg, no 'File:')-->
| image_size =
| image_size =
| alt =
| alt =
| caption =
| caption =
| birth_date = {{Birth year and age|1971}}<!--VIAF data-->
| birth_date = {{Birth year and age|1971}}<ref>References
Kuhn, M. (1971, January 1). Retrieved from [https://www.cl.cam.ac.uk/~mgk25/kuhn-da.pdf Sicherheitsanalyse eines Mikroprozessors mit Busverschlusselun]</ref>
| birth_place = [[Munich]], [[West Germany]]<!--http://en.wikipedia.org/enwiki/w/index.php?title=Markus_Kuhn_%28computer_scientist%29&diff=10194488&oldid=8306295-->
| birth_place = [[Munich]], [[West Germany]]<!--http://en.wikipedia.org/enwiki/w/index.php?title=Markus_Kuhn_%28computer_scientist%29&diff=10194488&oldid=8306295-->
| death_date = <!-- {{Death date and age|YYYY|MM|DD|YYYY|MM|DD}} (death date then birth date) -->
| death_date = <!-- {{Death date and age|df=y|YYYY|MM|DD|YYYY|MM|DD}} (death date then birth date) -->
| death_place =
| death_place =
| residence =
| residence =
| citizenship =
| citizenship =
| nationality =
| nationality =
| fields = [[Computer science]]<br>[[Computer security]]<br>[[Tamper resistance]]<ref>[http://dl.acm.org/author_page.cfm?id=81100443754 Markus Kuhn ACM author profile]</ref>
| fields = [[Computer science]]<br>[[Computer security]]<br>[[Tamper resistance]]<ref name="acm">{{ACMPortal|id=81100443754}}</ref>
<ref>{{Cite journal | last1 = Kuhn | first1 = M. G. | title = Cipher instruction search attack on the bus-encryption security microcontroller DS5002FP | doi = 10.1109/12.729797 | journal = IEEE Transactions on Computers | volume = 47 | issue = 10 | pages = 1153–1157 | year = 1998 }}</ref><ref name="Kuhn2002">{{Cite book | last1 = Kuhn | first1 = M. G. | chapter = Optical time-domain eavesdropping risks of CRT displays | doi = 10.1109/SECPRI.2002.1004358 | title = Proceedings 2002 IEEE Symposium on Security and Privacy | pages = 3–4 | year = 2002 | isbn = 978-0-7695-1543-4 | citeseerx = 10.1.1.7.5870 | s2cid = 2385507 }}</ref><ref>{{Cite book | last1 = Hancke | first1 = G. P. | last2 = Kuhn | first2 = M. G. | doi = 10.1109/SECURECOMM.2005.56 | chapter = An RFID Distance Bounding Protocol | title = First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05) | pages = 67 | year = 2005 | isbn = 978-0-7695-2369-9 | s2cid = 435025 }}</ref><ref>{{Cite journal | last1 = Petitcolas | first1 = F. A. P. | last2 = Anderson | first2 = R. J. | last3 = Kuhn | first3 = M. G. | doi = 10.1109/5.771065 | title = Information hiding-a survey | journal = Proceedings of the IEEE | volume = 87 | issue = 7 | pages = 1062 | year = 1999 | citeseerx = 10.1.1.333.9397 }}</ref><ref>{{Cite book | last1 = Kuhn | first1 = M. G. | chapter = Compromising emanations of LCD TV sets | doi = 10.1109/ISEMC.2011.6038442 | title = 2011 IEEE International Symposium on Electromagnetic Compatibility | pages = 931–936 | year = 2011 | isbn = 978-1-4577-0812-1 | s2cid = 47153474 }}</ref>
<ref>{{cite doi|10.1109/12.729797}}</ref><ref>{{cite doi|10.1109/SECPRI.2002.1004358}}</ref><ref>{{cite doi|10.1109/SECURECOMM.2005.56}}</ref><ref>{{cite doi|10.1109/5.771065}}</ref><ref>{{cite doi|10.1109/ISEMC.2011.6038442}}</ref>
| workplaces = [[University of Cambridge]]<br>[[Purdue University]]<br>[[University of Erlangen-Nuremberg]]
| workplaces = {{Plainlist|
* [[University of Cambridge]]
* [[Purdue University]]
* [[University of Erlangen-Nuremberg]]}}
| alma_mater = [[University of Erlangen-Nuremberg]]<br>[[Purdue University]]<br>[[Wolfson College, Cambridge]]
| alma_mater = {{Plainlist|
* [[University of Erlangen-Nuremberg]]
* [[Purdue University]]
* [[Wolfson College, Cambridge]]}}
| thesis_title = Compromising emanations: eavesdropping risks of computer displays
| thesis_title = Compromising emanations: eavesdropping risks of computer displays
| thesis_url = http://ulmss-newton.lib.cam.ac.uk/vwebv/holdingsInfo?bibId=24253
| thesis_url = http://ulmss-newton.lib.cam.ac.uk/vwebv/holdingsInfo?bibId=24253
Line 21: Line 32:
| doctoral_advisor = [[Ross J. Anderson]]<ref name="mathgene">{{MathGenealogy|id=161231}}</ref>
| doctoral_advisor = [[Ross J. Anderson]]<ref name="mathgene">{{MathGenealogy|id=161231}}</ref>
| academic_advisors =
| academic_advisors =
| doctoral_students = [[Steven Murdoch]]<ref name="murdochphd">{{cite thesis |degree=PhD |first=Steven James|last=Murdoch |title=Covert channel vulnerabilities in anonymity systems |publisher=University of Cambridge |year=2008 |url=http://ulmss-newton.lib.cam.ac.uk/vwebv/holdingsInfo?bibId=30158}}</ref>
| doctoral_students = Saar Drimer<ref>{{cite doi|10.1007/978-3-642-00641-8_8}}</ref><br>Gerhard Hancke<ref>{{cite doi|10.1145/1352533.1352566}}</ref><br>Andrew Lewis<br>Steven Murdoch<br>Piotr Zieliński<ref name="mathgene"/>
| notable_students =
| notable_students =
| known_for = [[EURion constellation]]
| known_for = [[EURion constellation]]
Line 31: Line 42:
| signature = <!--(filename only)-->
| signature = <!--(filename only)-->
| signature_alt =
| signature_alt =
| website = {{URL|http://www.cl.cam.ac.uk/~mgk25}}
| website = {{URL|https://www.cl.cam.ac.uk/~mgk25/}}
| footnotes =
| footnotes =
| spouse =
| spouse =
| children =
| children =
}}
}}
'''Markus Guenther Kuhn''' (born 1971) is a [[Germany|German]] [[computer science|computer scientist]], currently teaching and researching at the [[University of Cambridge Computer Laboratory]].<ref>[http://www.cl.cam.ac.uk/DeptInfo/Overview/ The Blue Book] - "The Computer Laboratory: an Introduction", University of Cambridge Computer Laboratory, Oct 2006</ref><ref name="googlescholar">{{GoogleScholar|4FSAZOsAAAAJ}}</ref><ref name="microsoft">{{AcademicSearch|1399760}}</ref><ref name="dblp">{{DBLP|id=Kuhn:Markus_G=}}</ref>
'''Markus Guenther Kuhn''' (born 1971) is a German [[computer scientist]], currently working at the [[Computer Laboratory, University of Cambridge]] and a fellow of [[Wolfson College, Cambridge]].<ref>[http://www.cl.cam.ac.uk/DeptInfo/Overview/ The Blue Book] "The Computer Laboratory: an Introduction", University of Cambridge Computer Laboratory, Oct 2006 {{webarchive |url=https://web.archive.org/web/20070204065322/http://www.cl.cam.ac.uk/DeptInfo/Overview/ |date=4 February 2007 }}</ref><ref name="googlescholar">{{GoogleScholar|4FSAZOsAAAAJ}}</ref><ref name="microsoft">{{AcademicSearch|1399760}}</ref><ref name="dblp">{{DBLP|name=Markus G. Kuhn}}</ref><ref name="scopus">{{Scopus|id=8900011300}}</ref>


==Education==
==Education==
Kuhn was educated at [[University of Erlangen-Nuremberg|University of Erlangen]] ([[Germany]]), he received his [[Master of Science]] degree at [[Purdue University]] and [[Doctor of Philosophy|PhD]] at the [[University of Cambridge]]. He is a Fellow of [[Wolfson College, Cambridge]].
Kuhn was educated at [[University of Erlangen-Nuremberg|University of Erlangen]] (Germany), he received his Master of Science degree at [[Purdue University]] and PhD at the [[University of Cambridge]].


==Research==
==Research==
Kuhn's main research interests include [[computer security]], in particular the hardware and signal-processing aspects of it, and [[distributed system]]s. He is known, among other things, for his work on [[Secure cryptoprocessor|security microcontrollers]], [[TEMPEST|compromising emanations]], and [[distance-bounding protocol]]s. He developed the Stirmark test for [[digital watermarking]] schemes, the [[OTPW]] one-time password system, and headed the project that extended the [[X11]] [[misc-fixed]] fonts to [[Unicode]].
Kuhn's main research interests include [[computer security]], in particular the hardware and signal-processing aspects of it, and [[distributed system]]s. He is known, among other things, for his work on [[Secure cryptoprocessor|security microcontrollers]], [[Tempest (codename)|compromising emanations]], and [[distance-bounding protocol]]s. He developed the Stirmark test for [[digital watermarking]] schemes, the [[OTPW]] one-time password system, and headed the project that extended the [[X11]] [[misc-fixed]] fonts to [[Unicode]].


In 1987 and 1988, he won the German national computer-science contest,<ref>P. Heyderhoff: Bundeswettbewerb Informatik. Informatik Spektrum, Vol. 11, pp. 107-108, Springer-Verlag, 1988</ref> and in 1989, he won a gold medal for the West German team at the [[International Olympiad in Informatics]].<ref>P. Heyderhoff: Informatik-Olympiade. Informatik Spektrum, Vol. 12, p. 235, Springer-Verlag, 1989</ref><ref>[http://www.oi.edu.pl/ioires/c_ioi89.html Results of the IOI 1989]</ref> In 1994, as an undergraduate student, he became known for developing several ways to circumvent the [[VideoCrypt]] encryption system, most notably the ''Season7'' smartcard emulator.<ref>{{Cite web | title=MS-DOS Videocrypt smart card emulator | url=http://www.textfiles.com/hacking/CABLE/season7.txt | date=1994-06-19 | author=Markus Kuhn }}</ref>
In 1994, as an undergraduate student, he became known for developing several ways to circumvent the [[VideoCrypt]] encryption system, most notably the ''Season7'' smartcard emulator.<ref>{{Cite web | title=MS-DOS Videocrypt smart card emulator | url=http://www.textfiles.com/hacking/CABLE/season7.txt | date=19 June 1994 | first=Markus | last=Kuhn }}</ref>


In 2002, he published a new method for eavesdropping CRT screens<ref name="Kuhn2002" /> and in 2003 he went on to publish mitigations such as "Tempest fonts".<ref>{{cite journal |last= Kuhn |first= Markus G. |author-link= Markus Kuhn (computer scientist) |date=December 2003|title= Compromising emanations: eavesdropping risks of computer displays |journal=Technical Report |issue= 577|publisher= University of Cambridge Computer Laboratory |location= Cambridge, United Kingdom |issn= 1476-2986 |id= UCAM-CL-TR-577 |url= http://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-577.pdf |access-date= 2010-10-29}}</ref>
In 2002, he published a new method for eavesdropping CRT screens.<ref>{{cite doi|10.1109/SECPRI.2002.1004358}}</ref>


In 2010 Kuhn was asked to analyze the [[ADE-651]], a device used in Iraq that was said to be a bomb-detecting device; he found that it contained nothing but an anti-theft tag and said that it was "impossible" that the device could detect anything whatsoever.<ref>{{vancite news |work=BBC News |title=Iraq backing for 'bomb detector' |date=2010-01-24 |url=http://news.bbc.co.uk/2/low/middle_east/8477601.stm }}</ref>
In 2010, Kuhn was asked to analyse the [[ADE 651]], a device used in Iraq that was said to be a bomb-detecting device; he found that it contained nothing but an anti-theft tag and said that it was "impossible" that the device could detect anything whatsoever.<ref>{{cite news |work=BBC News|title=Iraq backing for 'bomb detector' |date=24 January 2010 |url=http://news.bbc.co.uk/2/low/middle_east/8477601.stm }}</ref>


He is also known for some of his work on international standardization, such as pioneering the introduction of [[Unicode]]/[[UTF-8]] under [[Linux]].<ref>[http://www.cl.cam.ac.uk/~mgk25/unicode.html UTF-8 and Unicode FAQ for Unix/Linux]</ref>
He is also known for some of his work on international standardisation, such as pioneering the introduction of [[Unicode]]/[[UTF-8]] under [[Linux]].<ref>[http://www.cl.cam.ac.uk/~mgk25/unicode.html UTF-8 and Unicode FAQ for Unix/Linux]</ref>

==Awards and honours==
In 1987 and 1988, he won the German national computer-science contest,<ref>P. Heyderhoff: Bundeswettbewerb Informatik. Informatik Spektrum, Vol. 11, pp. 107–108, Springer-Verlag, 1988</ref> and in 1989, he won a gold medal for the West German team at the [[International Olympiad in Informatics]].<ref>P. Heyderhoff: Informatik-Olympiade. Informatik Spektrum, Vol. 12, p. 235, Springer-Verlag, 1989</ref><ref>[http://www.oi.edu.pl/ioires/c_ioi89.html Results of the IOI 1989] {{webarchive|url=https://web.archive.org/web/20070628212422/http://www.oi.edu.pl/ioires/c_ioi89.html |date=28 June 2007 }}</ref>


==References==
==References==
{{reflist}}
<references/>

{{Authority control}}


{{Authority control|VIAF=210402325}}
{{Persondata
|NAME=Kuhn, Markus G.
|ALTERNATIVE NAMES=Kuhn, Markus
|SHORT DESCRIPTION=German computer scientist
|DATE OF BIRTH=1971
|PLACE OF BIRTH=[[Munich]]
|DATE OF DEATH=
|PLACE OF DEATH=
}}
{{DEFAULTSORT:Kuhn, Markus}}
{{DEFAULTSORT:Kuhn, Markus}}
[[Category:1971 births]]
[[Category:1971 births]]
Line 72: Line 78:
[[Category:Fellows of Wolfson College, Cambridge]]
[[Category:Fellows of Wolfson College, Cambridge]]
[[Category:Members of the University of Cambridge Computer Laboratory]]
[[Category:Members of the University of Cambridge Computer Laboratory]]
[[Category:People associated with computer security]]
[[Category:Computer security academics]]
[[Category:Studienstiftung alumni]]
[[Category:Studienstiftung alumni]]
[[Category:University of Erlangen-Nuremberg alumni]]
[[Category:University of Erlangen-Nuremberg alumni]]
[[Category:People from Munich]]
[[Category:Scientists from Munich]]
[[Category:Alumni of the University of Cambridge]]
[[Category:Alumni of the University of Cambridge]]

Latest revision as of 00:43, 20 September 2023

Markus Kuhn
Born
Markus Guenther Kuhn

1971 (age 52–53)[9]
Alma mater
Known forEURion constellation
Scientific career
FieldsComputer science
Computer security
Tamper resistance[1] [2][3][4][5][6]
Institutions
ThesisCompromising emanations: eavesdropping risks of computer displays (2002)
Doctoral advisorRoss J. Anderson[7]
Doctoral studentsSteven Murdoch[8]
Websitewww.cl.cam.ac.uk/~mgk25/

Markus Guenther Kuhn (born 1971) is a German computer scientist, currently working at the Computer Laboratory, University of Cambridge and a fellow of Wolfson College, Cambridge.[10][11][12][13][14]

Education

[edit]

Kuhn was educated at University of Erlangen (Germany), he received his Master of Science degree at Purdue University and PhD at the University of Cambridge.

Research

[edit]

Kuhn's main research interests include computer security, in particular the hardware and signal-processing aspects of it, and distributed systems. He is known, among other things, for his work on security microcontrollers, compromising emanations, and distance-bounding protocols. He developed the Stirmark test for digital watermarking schemes, the OTPW one-time password system, and headed the project that extended the X11 misc-fixed fonts to Unicode.

In 1994, as an undergraduate student, he became known for developing several ways to circumvent the VideoCrypt encryption system, most notably the Season7 smartcard emulator.[15]

In 2002, he published a new method for eavesdropping CRT screens[3] and in 2003 he went on to publish mitigations such as "Tempest fonts".[16]

In 2010, Kuhn was asked to analyse the ADE 651, a device used in Iraq that was said to be a bomb-detecting device; he found that it contained nothing but an anti-theft tag and said that it was "impossible" that the device could detect anything whatsoever.[17]

He is also known for some of his work on international standardisation, such as pioneering the introduction of Unicode/UTF-8 under Linux.[18]

Awards and honours

[edit]

In 1987 and 1988, he won the German national computer-science contest,[19] and in 1989, he won a gold medal for the West German team at the International Olympiad in Informatics.[20][21]

References

[edit]
  1. ^ Markus Kuhn author profile page at the ACM Digital Library
  2. ^ Kuhn, M. G. (1998). "Cipher instruction search attack on the bus-encryption security microcontroller DS5002FP". IEEE Transactions on Computers. 47 (10): 1153–1157. doi:10.1109/12.729797.
  3. ^ a b Kuhn, M. G. (2002). "Optical time-domain eavesdropping risks of CRT displays". Proceedings 2002 IEEE Symposium on Security and Privacy. pp. 3–4. CiteSeerX 10.1.1.7.5870. doi:10.1109/SECPRI.2002.1004358. ISBN 978-0-7695-1543-4. S2CID 2385507.
  4. ^ Hancke, G. P.; Kuhn, M. G. (2005). "An RFID Distance Bounding Protocol". First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05). p. 67. doi:10.1109/SECURECOMM.2005.56. ISBN 978-0-7695-2369-9. S2CID 435025.
  5. ^ Petitcolas, F. A. P.; Anderson, R. J.; Kuhn, M. G. (1999). "Information hiding-a survey". Proceedings of the IEEE. 87 (7): 1062. CiteSeerX 10.1.1.333.9397. doi:10.1109/5.771065.
  6. ^ Kuhn, M. G. (2011). "Compromising emanations of LCD TV sets". 2011 IEEE International Symposium on Electromagnetic Compatibility. pp. 931–936. doi:10.1109/ISEMC.2011.6038442. ISBN 978-1-4577-0812-1. S2CID 47153474.
  7. ^ Markus Kuhn at the Mathematics Genealogy Project
  8. ^ Murdoch, Steven James (2008). Covert channel vulnerabilities in anonymity systems (PhD thesis). University of Cambridge.
  9. ^ References Kuhn, M. (1971, January 1). Retrieved from Sicherheitsanalyse eines Mikroprozessors mit Busverschlusselun
  10. ^ The Blue Book – "The Computer Laboratory: an Introduction", University of Cambridge Computer Laboratory, Oct 2006 Archived 4 February 2007 at the Wayback Machine
  11. ^ Markus Kuhn publications indexed by Google Scholar
  12. ^ Markus Kuhn publications indexed by Microsoft Academic
  13. ^ Markus G. Kuhn at DBLP Bibliography Server Edit this at Wikidata
  14. ^ Markus Kuhn's publications indexed by the Scopus bibliographic database. (subscription required)
  15. ^ Kuhn, Markus (19 June 1994). "MS-DOS Videocrypt smart card emulator".
  16. ^ Kuhn, Markus G. (December 2003). "Compromising emanations: eavesdropping risks of computer displays" (PDF). Technical Report (577). Cambridge, United Kingdom: University of Cambridge Computer Laboratory. ISSN 1476-2986. UCAM-CL-TR-577. Retrieved 29 October 2010.
  17. ^ "Iraq backing for 'bomb detector'". BBC News. 24 January 2010.
  18. ^ UTF-8 and Unicode FAQ for Unix/Linux
  19. ^ P. Heyderhoff: Bundeswettbewerb Informatik. Informatik Spektrum, Vol. 11, pp. 107–108, Springer-Verlag, 1988
  20. ^ P. Heyderhoff: Informatik-Olympiade. Informatik Spektrum, Vol. 12, p. 235, Springer-Verlag, 1989
  21. ^ Results of the IOI 1989 Archived 28 June 2007 at the Wayback Machine