2024
- Unai Rioja, Lejla Batina, Igor Armendariz, Jose Luis Flores: Keep it unbiased: a comparison between estimation of distribution algorithms and deep learning for human interaction-free side-channel analysis. J. Cryptogr. Eng. 14(3): 499-511 (2024)
- Vahid Jahandideh, Bart Mennink, Lejla Batina: An Algebraic Approach for Evaluating Random Probing Security With Application to AES. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(4): 657-689 (2024)
- Azade Rezaeezade, Lejla Batina: Regularizers to the rescue: fighting overfitting in deep learning-based side-channel analysis. J. Cryptogr. Eng. 14(4): 609-629 (2024)
- Azade Rezaeezade, Abraham Basurto-Becerra, Léo Weissbart, Guilherme Perin: One for All, All for Ascon: Ensemble-Based Deep Learning Side-Channel Analysis. ACNS Workshops (1) 2024: 139-157
- Péter Horváth, Dirk Lauret, Zhuoran Liu, Lejla Batina: SoK: Neural Network Extraction Through Physical Side Channels. USENIX Security Symposium 2024
- Xiaoyun Xu, Zhuoran Liu, Stefanos Koffas, Shujian Yu, Stjepan Picek: BAN: Detecting Backdoors Activated by Adversarial Neuron Noise. NeurIPS 2024.
- Gabriele Serafini, Léo Weissbart, Lejla Batina: Everything All at Once: Deep Learning Side-Channel Analysis Optimization Framework. ACNS Workshops (1) 2024: 195-212
- Péter Horváth, Lukasz Chmielewski, Leo Weissbart, Lejla Batina, Yuval Yarom: CNN Architecture Extraction on Edge GPU. ACNS Workshops (1) 2024: 158-175
- Asmita Adhikary, Abraham Basurto, Lejla Batina, Ileana Buhan, Joan Daemen, Silvia Mella, Nele Mentens, Stjepan Picek, Durga Lakshmi Ramachandran, Abolfazl Sajadi, Todor Stefanov, Dennis Vermoen, Nusa Zidaric: PROACT - Physical Attack Resistance of Cryptographic Algorithms and Circuits with Reduced Time to Market. ARC 2024: 255-266
- Omid Bazangani, Parisa Amiri Eliasi, Stjepan Picek, Lejla Batina: Can Machine Learn Pipeline Leakage? DATE 2024: 1-6
- Mahnaz Namazi Rizi, Nusa Zidaric, Lejla Batina, Nele Mentens: Optimised AES with RISC-V Vector Extensions. DDECS 2024: 57-60
- Parisa Amiri Eliasi, Silvia Mella, Léo Weissbart, Lejla Batina, Stjepan Picek: Xoodyak Under SCA Siege. DDECS 2024: 61-66
- Omid Bazangani, Alexandre Iooss, Ileana Buhan, Lejla Batina: ABBY: Automating leakage modelling for side-channel analysis. AsiaCCS 2024
- Lichao Wu, Azade Rezaeezade, Amir Alipour, Guilherme Perin, Stjepan Picek: Leakage Model-flexible Deep Learning-based Side-channel Analysis. IACR Commun. Cryptol. 1(3): 41 (2024)
- Joan Daemen, Daniël Kuijsters, Silvia Mella, Denise Verbakel: Propagation properties of a non-linear mapping based on squaring in odd characteristic. Cryptogr. Commun. 16(5): 997-1011 (2024)
- Parisa Amiri-Eliasi, Koustabh Ghosh, Joan Daemen: Mystrium: Wide Block Encryption Efficient on Entry-Level Processors. SCN (2) 2024: 71-96
- Parisa Amiri-Eliasi, Yanis Belkheyar, Joan Daemen, Santosh Ghosh, Daniël Kuijsters, Alireza Mehrdad, Silvia Mella, Shahram Rasoolzadeh, Gilles Van Assche: Koala: A Low-Latency Pseudorandom Function. IACR Cryptol. ePrint Arch. 2024: 1249 (2024)
- Joan Daemen, Seth Hoffert, Silvia Mella, Gilles Van Assche, Ronny Van Keer: Shaking up authenticated encryption. IACR Cryptol. ePrint Arch. 2024: 1618 (2024)
- Konstantina Miteloudi, Asmita Adhikary, Niels van Drueten, Lejla Batina, Ileana Buhan: Plan your defense: A comparative analysis of leakage detection methods on RISC-V cores. IACR Cryptol. ePrint Arch. 2024: 423 (2024)
- Trevor Yap Hong Eng, Shivam Bhasin, Léo Weissbart: Train Wisely: Multifidelity Bayesian Optimization Hyperparameter Tuning in Side-Channel Analysis. IACR Cryptol. ePrint Arch. 2024: 170 (2024)
- Ischa Stork, Vipul Arora, Lukasz Chmielewski, Ileana Buhan: Towards Explainable Side-Channel Leakage: Unveiling the Secrets of Microarchitecture. IACR Cryptol. ePrint Arch. 2024: 1792 (2024)
- Asmita Adhikary, Abraham Basurto-Becerra, Lejla Batina, Ileana Buhan, Durba Chatterjee, Senna van Hoek, Eloi Sanfelix Gonzalez: ARCHER: Architecture-Level Simulator for Side-Channel Analysis in RISC-V Processors. IACR Cryptol. ePrint Arch. 2024: 1866 (2024)
- Asmita Adhikary, Giacomo Tommaso Petrucci, Philippe Tanguy, Vianney Lapôtre, Ileana Buhan: SoK: The apprentice guide to automated fault injection simulation for security evaluation. IACR Cryptol. ePrint Arch. 2024: 1944 (2024)
- Asier Gambra, Durba Chatterjee, Unai Rioja, Igor Armendariz, Lejla Batina: Machine Learning-Based Detection of Glitch Attacks in Clock Signal Data. IACR Cryptol. ePrint Arch. 2024: 1939 (2024)
2023
- Stjepan Picek, Guilherme Perin, Luca Mariot, Lichao Wu, Lejla Batina: SoK: Deep Learning-based Physical Side-channel Analysis. ACM Comput. Surv. 55(11): 227:1-227:35 (2023)
- Lejla Batina, Lukasz Chmielewski, Björn Haase, Niels Samwel, Peter Schwabe: SoK: SCA-secure ECC in software - mission impossible? IACR Trans. Cryptogr. Hardw. Embed. Syst. 2023(1): 557-589 (2023)
- Lichao Wu, Léo Weissbart, Marina Krcek, Huimin Li, Guilherme Perin, Lejla Batina, Stjepan Picek: Label Correlation in Deep Learning-Based Side-Channel Analysis. IEEE Trans. Inf. Forensics Secur. 18: 3849-3861 (2023)
- Asmita Adhikary, Ileana Buhan: SoK: Assisted Fault Simulation - Existing Challenges and Opportunities Offered by AI. ACNS Workshops 2023: 178-195
- Koustabh Ghosh, Parisa Amiri-Eliasi, Joan Daemen: Multimixer-128: Universal Keyed Hashing Based on Integer Multiplication. IACR Trans. Symmetric Cryptol. 2023(3): 1-24 (2023)
- Koustabh Ghosh, Jonathan Fuchs, Parisa Amiri-Eliasi, Joan Daemen: Universal Hashing Based on Field Multiplication and (Near-)MDS Matrices. AFRICACRYPT 2023: 129-150
- Koustabh Ghosh, Parisa Amiri-Eliasi, Joan Daemen: Multimixer-156: Universal Keyed Hashing Based on Integer Multiplication and Cyclic Shift. INDOCRYPT (1) 2023: 3-24
- Zhuoran Liu, Zhengyu Zhao, Martha A. Larson: Image Shortcut Squeezing: Countering Perturbative Availability Poisons with Compression. ICML 2023: 22473-22487
- Silvia Mella, Alireza Mehrdad, Joan Daemen: Differential and Linear properties of vectorial boolean functions based on chi. Cryptogr. Commun. 15(6): 1087-1116 (2023)
- Silvia Mella, Joan Daemen, Gilles Van Assche: Tighter Trail Bounds for Xoodoo. IACR Trans. Symmetric Cryptol. 2023(4): 187-214 (2023)
- Joan Daemen, Silvia Mella, Gilles Van Assche: Committing authenticated encryption based on SHAKE. IACR Cryptol. ePrint Arch. 2023: 1494 (2023)
- Péter Horváth, Lukasz Chmielewski, Leo Weissbart, Lejla Batina, Yuval Yarom: BarraCUDA: Bringing Electromagnetic Side Channel Into Play to Steal the Weights of Neural Networks from NVIDIA GPUs. CoRR abs/2312.07783 (2023)
- Praveen Kulkarni, Vincent Verneuil, Stjepan Picek, Lejla Batina: Order vs. Chaos: A Language Model Approach for Side-channel Attacks. IACR Cryptol. ePrint Arch. 2023: 1615 (2023)
- Léo Weissbart, Stjepan Picek: Lightweight but Not Easy: Side-channel Analysis of the Ascon Authenticated Cipher on a 32-bit Microcontroller. IACR Cryptol. ePrint Arch. 2023: 1598 (2023)
2022
- Lejla Batina, Shivam Bhasin, Dirmanto Jap, Stjepan Picek: SCA Strikes Back: Reverse-Engineering Neural Network Architectures Using Side Channels. IEEE Des. Test 39(4): 7-14 (2022)
- Servio Paguada, Lejla Batina, Ileana Buhan, Igor Armendariz: Playing With Blocks: Toward Re-Usable Deep Learning Models for Side-Channel Profiled Attacks. IEEE Trans. Inf. Forensics Secur. 17: 2835-2847 (2022)
- Unai Rioja, Lejla Batina, Igor Armendariz, Jose Luis Flores: Towards Human Dependency Elimination: AI Approach to SCA Robustness Assessment. IEEE Trans. Inf. Forensics Secur. 17: 3906-3921 (2022)
- Nicoleta-Norica Bacuieti, Lejla Batina, Stjepan Picek: Deep Neural Networks Aiding Cryptanalysis: A Case Study of the Speck Distinguisher. ACNS 2022: 809-829
- Ileana Buhan, Lejla Batina, Yuval Yarom, Patrick Schaumont: SoK: Design Tools for Side-Channel-Aware Implementations. AsiaCCS 2022: 756-770
- Naila Mukhtar, Louiza Papachristodoulou, Apostolos P. Fournaris, Lejla Batina, Yinan Kong: Machine-Learning Assisted Side-Channel Attacks on RNS ECC Implementations Using Hybrid Feature Engineering. COSADE 2022: 3-28
- Naila Mukhtar, Lejla Batina, Stjepan Picek, Yinan Kong: Fake It Till You Make It: Data Augmentation Using Generative Adversarial Networks for All the Crypto You Need on Small Devices. CT-RSA 2022: 297-321
- Lejla Batina, Shivam Bhasin, Jakub Breier, Xiaolu Hou, Dirmanto Jap: On Implementation-Level Security of Edge-Based Machine Learning Models. Security and Artificial Intelligence 2022: 335-359
- Lichao Wu, Leo Weissbart, Marina Krcek, Huimin Li, Guilherme Perin, Lejla Batina, Stjepan Picek: AGE Is Not Just a Number: Label Distribution in Deep Learning-based Side-channel Analysis. IACR Cryptol. ePrint Arch. 2022: 1507 (2022)
- Jurian van Geest, Ileana Buhan: A Side-Channel Based Disassembler for the ARM-Cortex M0. ACNS Workshops 2022: 183-199
- Asmita Adhikary, Ileana Buhan: SoK: Getting started with open-source fault simulation tools. IACR Cryptol. ePrint Arch. 2022: 1675 (2022)
- Estuardo Alpirez Bock, Lukasz Chmielewski, Konstantina Miteloudi: Protecting the Most Significant Bits in Scalar Multiplication Algorithms. SPACE 2022: 118-137
- Azade Rezaeezade, Guilherme Perin, Stjepan Picek: To Overfit, or Not to Overfit: Improving the Performance of Deep Learning-Based SCA. AFRICACRYPT 2022: 397-421
- Azade Rezaeezade, Lejla Batina: Regularizers to the Rescue: Fighting Overfitting in Deep Learning-based Side-channel Analysis. IACR Cryptol. ePrint Arch. 2022: 1737 (2022)
2021
- Servio Paguada, Lejla Batina, Igor Armendariz: Toward practical autoencoder-based side-channel analysis evaluations. Comput. Networks 196: 108230 (2021)
- Unai Rioja, Lejla Batina, Jose Luis Flores, Igor Armendariz: Auto-tune POIs: Estimation of distribution algorithms for efficient side-channel analysis. Comput. Networks 198: 108405 (2021)
- Unai Rioja, Servio Paguada, Lejla Batina, Igor Armendariz: The Uncertainty of Side-channel Analysis: A Way to Leverage from Heuristics. ACM J. Emerg. Technol. Comput. Syst. 17(3): 40:1-40:27 (2021)
- Guilherme Perin, Lukasz Chmielewski, Lejla Batina, Stjepan Picek: Keep it Unsupervised: Horizontal Attacks Meet Deep Learning. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(1): 343-372 (2021)
- Madura A. Shelton, Lukasz Chmielewski, Niels Samwel, Markus Wagner, Lejla Batina, Yuval Yarom: Rosita++: Automatic Higher-Order Leakage Elimination from Cryptographic Code. CCS 2021: 685-699
- Lejla Batina, Rosario Cammarota, Nele Mentens, Ahmad-Reza Sadeghi, Johanna Sepúlveda, Shaza Zeitouni: Invited: Security Beyond Bulk Silicon: Opportunities and Challenges of Emerging Devices. DAC 2021: 1-4
- Unai Rioja, Lejla Batina, Jose Luis Flores, Igor Armendariz: Towards Automatic and Portable Data Loading Template Attacks on Microcontrollers. ISQED 2021: 437-443
- Zhuoran Liu, Niels Samwel, Leo Weissbart, Zhengyu Zhao, Dirk Lauret, Lejla Batina, Martha A. Larson: Screen Gleaning: A Screen Reading TEMPEST Attack on Mobile Devices Exploiting an Electromagnetic Side Channel. NDSS 2021
- Madura A. Shelton, Niels Samwel, Lejla Batina, Francesco Regazzoni, Markus Wagner, Yuval Yarom: Rosita: Towards Automatic Elimination of Power-Analysis Leakage in Ciphers. NDSS 2021
- Konstantina Miteloudi, Lejla Batina, Joan Daemen, Nele Mentens: ROCKY: Rotation Countermeasure for the Protection of Keys and Other Sensitive Data. SAMOS 2021: 288-299
- Konstantina Miteloudi, Lukasz Chmielewski, Lejla Batina, Nele Mentens: Evaluating the ROCKY Countermeasure for Side-Channel Leakage. VLSI-SoC 2021: 1-6
- Lejla Batina, Milena Djukanovic, Annelie Heuser, Stjepan Picek: It Started with Templates: The Future of Profiling in Side-Channel Analysis. Security of Ubiquitous Computing Systems 2021: 133-145
- Ileana Buhan, Lejla Batina, Yuval Yarom, Patrick Schaumont: SoK: Design Tools for Side-Channel-Aware Implementions. CoRR abs/2104.08593 (2021)
- Unai Rioja, Lejla Batina, Igor Armendariz, Jose Luis Flores: Keep It Unbiased: A Comparison Between Estimation of Distribution Algorithms and Deep Learning for Human Interaction-Free Side-Channel Analysis. CoRR abs/2111.13425 (2021)
- Servio Paguada, Lejla Batina, Ileana Buhan, Igor Armendariz: Being Patient and Persistent: Optimizing An Early Stopping Strategy for Deep Learning in Profiled Attacks. CoRR abs/2111.14416 (2021)
- Lejla Batina, Lukasz Chmielewski, Björn Haase, Niels Samwel, Peter Schwabe: SCA-secure ECC in software - mission impossible? IACR Cryptol. ePrint Arch. 2021: 1003 (2021)
- Stjepan Picek, Guilherme Perin, Luca Mariot, Lichao Wu, Lejla Batina: SoK: Deep Learning-based Physical Side-channel Analysis. IACR Cryptol. ePrint Arch. 2021: 1092 (2021)
- Omid Bazangani, Alexandre Iooss, Ileana Buhan, Lejla Batina: ABBY: Automating the creation of fine-grained leakage models. IACR Cryptol. ePrint Arch. 2021: 1569 (2021)
- Vipul Arora, Ileana Buhan, Guilherme Perin, Stjepan Picek: A Tale of Two Boards: On the Influence of Microarchitecture on Side-Channel Leakage. CARDIS 2021: 80-96
- Guilherme Perin, Ileana Buhan, Stjepan Picek: Learning When to Stop: A Mutual Information Approach to Prevent Overfitting in Profiled Side-Channel Analysis. COSADE 2021: 53-81
- Lukasz Chmielewski, Leo Weissbart: On Reverse Engineering Neural Network Implementation on GPU. ACNS Workshops 2021: 96-113
2020
- Leo Weissbart, Lukasz Chmielewski, Stjepan Picek, Lejla Batina: Systematic Side-Channel Analysis of Curve25519 with Machine Learning. J. Hardw. Syst. Secur. 4(4): 314-328 (2020)
- Pedro Maat C. Massolino, Patrick Longa, Joost Renes, Lejla Batina: A Compact and Scalable Hardware/Software Co-design of SIKE. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(2): 245-271 (2020)
- Niels Roelofs, Niels Samwel, Lejla Batina, Joan Daemen: Online Template Attack on ECDSA: - Extracting Keys via the Other Side. AFRICACRYPT 2020: 323-336
- Unai Rioja, Lejla Batina, Igor Armendariz: When Similarities Among Devices are Taken for Granted: Another Look at Portability. AFRICACRYPT 2020: 337-357
- Ievgen Kabin, Zoya Dyka, Dan Klann, Nele Mentens, Lejla Batina, Peter Langendörfer: Breaking a fully Balanced ASIC Coprocessor Implementing Complete Addition Formulas on Weierstrass Elliptic Curves. DSD 2020: 270-276
- Thierry Simon, Lejla Batina, Joan Daemen, Vincent Grosso, Pedro Maat Costa Massolino, Kostas Papagiannopoulos, Francesco Regazzoni, Niels Samwel: Friet: An Authenticated Encryption Scheme with Built-in Fault Detection. EUROCRYPT (1) 2020: 581-611
- Lichao Wu,Leo Weissbart, Marina Krcek, Huimin Li, Guilherme Perin, Lejla Batina, Stjepan Picek: Everything is Connected: From Model Learnability to Guessing Entropy. IACR Cryptol. ePrint Arch. 2020: 899 (2020)
- Naila Mukhtar, Louiza Papachristodoulou, Apostolos P. Fournaris, Lejla Batina, Yinan Kong: Machine-Learning assisted Side-Channel Attacks on RNS-based Elliptic Curve Implementations using Hybrid Feature Engineering. IACR Cryptol. ePrint Arch. 2020: 1065 (2020)
- Leo Weissbart: Performance Analysis of Multilayer Perceptron in Profiling Side-Channel Analysis. ACNS Workshops 2020: 198-216