Jump to content

Markus Kuhn (computer scientist): Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
Dexbot (talk | contribs)
m Bot: Deprecating Template:Cite doi and some minor fixes
Dexbot (talk | contribs)
m Bot: Deprecating Template:Cite doi and some minor fixes
Line 14: Line 14:
| nationality =
| nationality =
| fields = [[Computer science]]<br>[[Computer security]]<br>[[Tamper resistance]]<ref name="acm">{{ACMPortal|id=81100443754}}</ref>
| fields = [[Computer science]]<br>[[Computer security]]<br>[[Tamper resistance]]<ref name="acm">{{ACMPortal|id=81100443754}}</ref>
<ref>{{Cite journal | last1 = Kuhn | first1 = M. G. | title = Cipher instruction search attack on the bus-encryption security microcontroller DS5002FP | doi = 10.1109/12.729797 | journal = IEEE Transactions on Computers | volume = 47 | issue = 10 | pages = 1153–1157 | year = 1998 | pmid = | pmc = }}</ref><ref name="Kuhn2002">{{cite doi|10.1109/SECPRI.2002.1004358|noedit}}</ref><ref>{{cite doi|10.1109/SECURECOMM.2005.56|noedit}}</ref><ref>{{Cite journal | last1 = Petitcolas | first1 = F. A. P. | last2 = Anderson | first2 = R. J. | last3 = Kuhn | first3 = M. G. | doi = 10.1109/5.771065 | title = Information hiding-a survey | journal = Proceedings of the IEEE | volume = 87 | issue = 7 | pages = 1062 | year = 1999 | pmid = | pmc = }}</ref><ref>{{cite doi|10.1109/ISEMC.2011.6038442|noedit}}</ref>
<ref>{{Cite journal | last1 = Kuhn | first1 = M. G. | title = Cipher instruction search attack on the bus-encryption security microcontroller DS5002FP | doi = 10.1109/12.729797 | journal = IEEE Transactions on Computers | volume = 47 | issue = 10 | pages = 1153–1157 | year = 1998 | pmid = | pmc = }}</ref><ref name="Kuhn2002">{{Cite book | last1 = Kuhn | first1 = M. G. | chapter = Optical time-domain eavesdropping risks of CRT displays | doi = 10.1109/SECPRI.2002.1004358 | title = Proceedings 2002 IEEE Symposium on Security and Privacy | pages = 3–4 | year = 2002 | isbn = 0-7695-1543-6 | pmid = | pmc = }}</ref><ref>{{Cite book | last1 = Hancke | first1 = G. P. | last2 = Kuhn | first2 = M. G. | doi = 10.1109/SECURECOMM.2005.56 | chapter = An RFID Distance Bounding Protocol | title = First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05) | pages = 67 | year = 2005 | isbn = 0-7695-2369-2 | pmid = | pmc = }}</ref><ref>{{Cite journal | last1 = Petitcolas | first1 = F. A. P. | last2 = Anderson | first2 = R. J. | last3 = Kuhn | first3 = M. G. | doi = 10.1109/5.771065 | title = Information hiding-a survey | journal = Proceedings of the IEEE | volume = 87 | issue = 7 | pages = 1062 | year = 1999 | pmid = | pmc = }}</ref><ref>{{Cite book | last1 = Kuhn | first1 = M. G. | chapter = Compromising emanations of LCD TV sets | doi = 10.1109/ISEMC.2011.6038442 | title = 2011 IEEE International Symposium on Electromagnetic Compatibility | pages = 931–936 | year = 2011 | isbn = 978-1-4577-0812-1 | pmid = | pmc = }}</ref>
| workplaces = {{Plainlist|
| workplaces = {{Plainlist|
* [[University of Cambridge]]
* [[University of Cambridge]]

Revision as of 08:30, 4 September 2015

Markus Kuhn
Born
Markus Guenther Kuhn

January 1971 (age 53)[11]
Alma mater
Known forEURion constellation
Scientific career
FieldsComputer science
Computer security
Tamper resistance[1] [2][3][4][5][6]
Institutions
ThesisCompromising emanations: eavesdropping risks of computer displays (2002)
Doctoral advisorRoss J. Anderson[7]
Doctoral studentsSaar Drimer[8]
Gerhard Hancke[9]
Andrew Lewis
Steven Murdoch[10]
Piotr Zieliński[7]
Websitewww.cl.cam.ac.uk/~mgk25

Markus Guenther Kuhn (born 1971) is a German computer scientist, currently working at the Computer Laboratory, University of Cambridge and a Fellow of Wolfson College, Cambridge.[12][13][14][15][16]

Education

Kuhn was educated at University of Erlangen (Germany), he received his Master of Science degree at Purdue University and PhD at the University of Cambridge.

Research

Kuhn's main research interests include computer security, in particular the hardware and signal-processing aspects of it, and distributed systems. He is known, among other things, for his work on security microcontrollers, compromising emanations, and distance-bounding protocols. He developed the Stirmark test for digital watermarking schemes, the OTPW one-time password system, and headed the project that extended the X11 misc-fixed fonts to Unicode.

In 1994, as an undergraduate student, he became known for developing several ways to circumvent the VideoCrypt encryption system, most notably the Season7 smartcard emulator.[17]

In 2002, he published a new method for eavesdropping CRT screens.[3]

In 2010 Kuhn was asked to analyze the ADE 651, a device used in Iraq that was said to be a bomb-detecting device; he found that it contained nothing but an anti-theft tag and said that it was "impossible" that the device could detect anything whatsoever.[18]

He is also known for some of his work on international standardization, such as pioneering the introduction of Unicode/UTF-8 under Linux.[19]

Awards and honours

In 1987 and 1988, he won the German national computer-science contest,[20] and in 1989, he won a gold medal for the West German team at the International Olympiad in Informatics.[21][22]

References

  1. ^ Markus Kuhn author profile page at the ACM Digital Library
  2. ^ Kuhn, M. G. (1998). "Cipher instruction search attack on the bus-encryption security microcontroller DS5002FP". IEEE Transactions on Computers. 47 (10): 1153–1157. doi:10.1109/12.729797.
  3. ^ a b Kuhn, M. G. (2002). "Optical time-domain eavesdropping risks of CRT displays". Proceedings 2002 IEEE Symposium on Security and Privacy. pp. 3–4. doi:10.1109/SECPRI.2002.1004358. ISBN 0-7695-1543-6.
  4. ^ Hancke, G. P.; Kuhn, M. G. (2005). "An RFID Distance Bounding Protocol". First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05). p. 67. doi:10.1109/SECURECOMM.2005.56. ISBN 0-7695-2369-2.
  5. ^ Petitcolas, F. A. P.; Anderson, R. J.; Kuhn, M. G. (1999). "Information hiding-a survey". Proceedings of the IEEE. 87 (7): 1062. doi:10.1109/5.771065.
  6. ^ Kuhn, M. G. (2011). "Compromising emanations of LCD TV sets". 2011 IEEE International Symposium on Electromagnetic Compatibility. pp. 931–936. doi:10.1109/ISEMC.2011.6038442. ISBN 978-1-4577-0812-1.
  7. ^ a b Markus Kuhn at the Mathematics Genealogy Project
  8. ^ Drimer, S.; Kuhn, M. G. (2009). "A Protocol for Secure Remote Updates of FPGA Configurations". Reconfigurable Computing: Architectures, Tools and Applications. Lecture Notes in Computer Science. Vol. 5453. p. 50. doi:10.1007/978-3-642-00641-8_8. ISBN 978-3-642-00640-1.
  9. ^ Hancke, G. P.; Kuhn, M. G. (2008). "Attacks on time-of-flight distance bounding channels". Proceedings of the first ACM conference on Wireless network security - WiSec '08. p. 194. doi:10.1145/1352533.1352566. ISBN 9781595938145.
  10. ^ Murdoch, Steven James (2008). Covert channel vulnerabilities in anonymity systems (PhD thesis). University of Cambridge.
  11. ^ https://www.cl.cam.ac.uk/~mgk25/kuhn-da.pdf
  12. ^ The Blue Book - "The Computer Laboratory: an Introduction", University of Cambridge Computer Laboratory, Oct 2006 Archived 2007-02-04 at the Wayback Machine
  13. ^ Markus Kuhn publications indexed by Google Scholar
  14. ^ Markus Kuhn publications indexed by Microsoft Academic
  15. ^ Markus Kuhn at DBLP Bibliography Server Edit this at Wikidata
  16. ^ Markus Kuhn's publications indexed by the Scopus bibliographic database. (subscription required)
  17. ^ Markus Kuhn (1994-06-19). "MS-DOS Videocrypt smart card emulator".
  18. ^ "Iraq backing for 'bomb detector'". BBC News. 2010-01-24.
  19. ^ UTF-8 and Unicode FAQ for Unix/Linux
  20. ^ P. Heyderhoff: Bundeswettbewerb Informatik. Informatik Spektrum, Vol. 11, pp. 107-108, Springer-Verlag, 1988
  21. ^ P. Heyderhoff: Informatik-Olympiade. Informatik Spektrum, Vol. 12, p. 235, Springer-Verlag, 1989
  22. ^ Results of the IOI 1989

Template:Persondata