Markus Kuhn (computer scientist): Difference between revisions
m Bot: Deprecating Template:Cite doi and some minor fixes |
m Bot: Deprecating Template:Cite doi and some minor fixes |
||
Line 14: | Line 14: | ||
| nationality = |
| nationality = |
||
| fields = [[Computer science]]<br>[[Computer security]]<br>[[Tamper resistance]]<ref name="acm">{{ACMPortal|id=81100443754}}</ref> |
| fields = [[Computer science]]<br>[[Computer security]]<br>[[Tamper resistance]]<ref name="acm">{{ACMPortal|id=81100443754}}</ref> |
||
<ref>{{Cite journal | last1 = Kuhn | first1 = M. G. | title = Cipher instruction search attack on the bus-encryption security microcontroller DS5002FP | doi = 10.1109/12.729797 | journal = IEEE Transactions on Computers | volume = 47 | issue = 10 | pages = 1153–1157 | year = 1998 | pmid = | pmc = }}</ref><ref name="Kuhn2002">{{ |
<ref>{{Cite journal | last1 = Kuhn | first1 = M. G. | title = Cipher instruction search attack on the bus-encryption security microcontroller DS5002FP | doi = 10.1109/12.729797 | journal = IEEE Transactions on Computers | volume = 47 | issue = 10 | pages = 1153–1157 | year = 1998 | pmid = | pmc = }}</ref><ref name="Kuhn2002">{{Cite book | last1 = Kuhn | first1 = M. G. | chapter = Optical time-domain eavesdropping risks of CRT displays | doi = 10.1109/SECPRI.2002.1004358 | title = Proceedings 2002 IEEE Symposium on Security and Privacy | pages = 3–4 | year = 2002 | isbn = 0-7695-1543-6 | pmid = | pmc = }}</ref><ref>{{Cite book | last1 = Hancke | first1 = G. P. | last2 = Kuhn | first2 = M. G. | doi = 10.1109/SECURECOMM.2005.56 | chapter = An RFID Distance Bounding Protocol | title = First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05) | pages = 67 | year = 2005 | isbn = 0-7695-2369-2 | pmid = | pmc = }}</ref><ref>{{Cite journal | last1 = Petitcolas | first1 = F. A. P. | last2 = Anderson | first2 = R. J. | last3 = Kuhn | first3 = M. G. | doi = 10.1109/5.771065 | title = Information hiding-a survey | journal = Proceedings of the IEEE | volume = 87 | issue = 7 | pages = 1062 | year = 1999 | pmid = | pmc = }}</ref><ref>{{Cite book | last1 = Kuhn | first1 = M. G. | chapter = Compromising emanations of LCD TV sets | doi = 10.1109/ISEMC.2011.6038442 | title = 2011 IEEE International Symposium on Electromagnetic Compatibility | pages = 931–936 | year = 2011 | isbn = 978-1-4577-0812-1 | pmid = | pmc = }}</ref> |
||
| workplaces = {{Plainlist| |
| workplaces = {{Plainlist| |
||
* [[University of Cambridge]] |
* [[University of Cambridge]] |
Revision as of 08:30, 4 September 2015
Markus Kuhn | |
---|---|
Born | Markus Guenther Kuhn January 1971 (age 53)[11] |
Alma mater | |
Known for | EURion constellation |
Scientific career | |
Fields | Computer science Computer security Tamper resistance[1] [2][3][4][5][6] |
Institutions | |
Thesis | Compromising emanations: eavesdropping risks of computer displays (2002) |
Doctoral advisor | Ross J. Anderson[7] |
Doctoral students | Saar Drimer[8] Gerhard Hancke[9] Andrew Lewis Steven Murdoch[10] Piotr Zieliński[7] |
Website | www |
Markus Guenther Kuhn (born 1971) is a German computer scientist, currently working at the Computer Laboratory, University of Cambridge and a Fellow of Wolfson College, Cambridge.[12][13][14][15][16]
Education
Kuhn was educated at University of Erlangen (Germany), he received his Master of Science degree at Purdue University and PhD at the University of Cambridge.
Research
Kuhn's main research interests include computer security, in particular the hardware and signal-processing aspects of it, and distributed systems. He is known, among other things, for his work on security microcontrollers, compromising emanations, and distance-bounding protocols. He developed the Stirmark test for digital watermarking schemes, the OTPW one-time password system, and headed the project that extended the X11 misc-fixed fonts to Unicode.
In 1994, as an undergraduate student, he became known for developing several ways to circumvent the VideoCrypt encryption system, most notably the Season7 smartcard emulator.[17]
In 2002, he published a new method for eavesdropping CRT screens.[3]
In 2010 Kuhn was asked to analyze the ADE 651, a device used in Iraq that was said to be a bomb-detecting device; he found that it contained nothing but an anti-theft tag and said that it was "impossible" that the device could detect anything whatsoever.[18]
He is also known for some of his work on international standardization, such as pioneering the introduction of Unicode/UTF-8 under Linux.[19]
Awards and honours
In 1987 and 1988, he won the German national computer-science contest,[20] and in 1989, he won a gold medal for the West German team at the International Olympiad in Informatics.[21][22]
References
- ^ Markus Kuhn author profile page at the ACM Digital Library
- ^ Kuhn, M. G. (1998). "Cipher instruction search attack on the bus-encryption security microcontroller DS5002FP". IEEE Transactions on Computers. 47 (10): 1153–1157. doi:10.1109/12.729797.
- ^ a b Kuhn, M. G. (2002). "Optical time-domain eavesdropping risks of CRT displays". Proceedings 2002 IEEE Symposium on Security and Privacy. pp. 3–4. doi:10.1109/SECPRI.2002.1004358. ISBN 0-7695-1543-6.
- ^ Hancke, G. P.; Kuhn, M. G. (2005). "An RFID Distance Bounding Protocol". First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05). p. 67. doi:10.1109/SECURECOMM.2005.56. ISBN 0-7695-2369-2.
- ^ Petitcolas, F. A. P.; Anderson, R. J.; Kuhn, M. G. (1999). "Information hiding-a survey". Proceedings of the IEEE. 87 (7): 1062. doi:10.1109/5.771065.
- ^ Kuhn, M. G. (2011). "Compromising emanations of LCD TV sets". 2011 IEEE International Symposium on Electromagnetic Compatibility. pp. 931–936. doi:10.1109/ISEMC.2011.6038442. ISBN 978-1-4577-0812-1.
- ^ a b Markus Kuhn at the Mathematics Genealogy Project
- ^ Drimer, S.; Kuhn, M. G. (2009). "A Protocol for Secure Remote Updates of FPGA Configurations". Reconfigurable Computing: Architectures, Tools and Applications. Lecture Notes in Computer Science. Vol. 5453. p. 50. doi:10.1007/978-3-642-00641-8_8. ISBN 978-3-642-00640-1.
- ^ Hancke, G. P.; Kuhn, M. G. (2008). "Attacks on time-of-flight distance bounding channels". Proceedings of the first ACM conference on Wireless network security - WiSec '08. p. 194. doi:10.1145/1352533.1352566. ISBN 9781595938145.
- ^ Murdoch, Steven James (2008). Covert channel vulnerabilities in anonymity systems (PhD thesis). University of Cambridge.
- ^ https://www.cl.cam.ac.uk/~mgk25/kuhn-da.pdf
- ^ The Blue Book - "The Computer Laboratory: an Introduction", University of Cambridge Computer Laboratory, Oct 2006 Archived 2007-02-04 at the Wayback Machine
- ^ Markus Kuhn publications indexed by Google Scholar
- ^ Markus Kuhn publications indexed by Microsoft Academic
- ^ Markus Kuhn at DBLP Bibliography Server
- ^ Markus Kuhn's publications indexed by the Scopus bibliographic database. (subscription required)
- ^ Markus Kuhn (1994-06-19). "MS-DOS Videocrypt smart card emulator".
- ^ "Iraq backing for 'bomb detector'". BBC News. 2010-01-24.
- ^ UTF-8 and Unicode FAQ for Unix/Linux
- ^ P. Heyderhoff: Bundeswettbewerb Informatik. Informatik Spektrum, Vol. 11, pp. 107-108, Springer-Verlag, 1988
- ^ P. Heyderhoff: Informatik-Olympiade. Informatik Spektrum, Vol. 12, p. 235, Springer-Verlag, 1989
- ^ Results of the IOI 1989
- 1971 births
- Living people
- German computer scientists
- Purdue University alumni
- Fellows of Wolfson College, Cambridge
- Members of the University of Cambridge Computer Laboratory
- People associated with computer security
- Studienstiftung alumni
- University of Erlangen-Nuremberg alumni
- People from Munich
- Alumni of the University of Cambridge