In 1994, as an undergraduate student, he became known for developing several ways to circumvent the
VideoCrypt encryption system, most notably the Season7 smartcard emulator.[15]
In 2002, he published a new method for eavesdropping CRT screens[3] and in 2003 he went on to publish mitigations such as "Tempest fonts".[16]
In 2010, Kuhn was asked to analyse the
ADE 651, a device used in Iraq that was said to be a bomb-detecting device; he found that it contained nothing but an anti-theft tag and said that it was "impossible" that the device could detect anything whatsoever.[17]
He is also known for some of his work on international standardisation, such as pioneering the introduction of
Unicode/
UTF-8 under
Linux.[18]
^Kuhn, M. G. (1998). "Cipher instruction search attack on the bus-encryption security microcontroller DS5002FP". IEEE Transactions on Computers. 47 (10): 1153–1157.
doi:
10.1109/12.729797.
^Hancke, G. P.; Kuhn, M. G. (2005). "An RFID Distance Bounding Protocol". First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05). p. 67.
doi:
10.1109/SECURECOMM.2005.56.
ISBN978-0-7695-2369-9.
S2CID435025.
^Petitcolas, F. A. P.; Anderson, R. J.; Kuhn, M. G. (1999). "Information hiding-a survey". Proceedings of the IEEE. 87 (7): 1062.
CiteSeerX10.1.1.333.9397.
doi:
10.1109/5.771065.
^The Blue Book – "The Computer Laboratory: an Introduction", University of Cambridge Computer Laboratory, Oct 2006
Archived 4 February 2007 at the
Wayback Machine