Publications

2024

  • Asmita Adhikary, Abraham Basurto, Lejla Batina, Ileana Buhan, Joan Daemen, Silvia Mella, Nele Mentens, Stjepan Picek, Durga Lakshmi Ramachandran, Abolfazl Sajadi, Todor Stefanov, Dennis Vermoen, Nusa Zidaric: PROACT - Physical Attack Resistance of Cryptographic Algorithms and Circuits with Reduced Time to Market. ARC 2024: 255-266
  • Péter Horváth, Lukasz Chmielewski, Leo Weissbart, Lejla Batina, Yuval Yarom: CNN architecture extraction on edge GPU. CoRR abs/2401.13575 (2024)

 

2023

  • Stjepan Picek, Guilherme Perin, Luca Mariot, Lichao Wu, Lejla Batina: SoK: Deep Learning-based Physical Side-channel Analysis. ACM Comput. Surv. 55(11): 227:1-227:35 (2023)
  • Lejla Batina, Lukasz Chmielewski, Björn Haase, Niels Samwel, Peter Schwabe: SoK: SCA-secure ECC in software - mission impossible? IACR Trans. Cryptogr. Hardw. Embed. Syst. 2023(1): 557-589 (2023)
  • Lichao Wu, Léo Weissbart, Marina Krcek, Huimin Li, Guilherme Perin, Lejla Batina, Stjepan Picek: Label Correlation in Deep Learning-Based Side-Channel Analysis. IEEE Trans. Inf. Forensics Secur. 18: 3849-3861 (2023)
  • Koustabh Ghosh, Jonathan Fuchs, Parisa Amiri-Eliasi, Joan Daemen: Universal Hashing Based on Field Multiplication and (Near-)MDS Matrices. AFRICACRYPT 2023: 129-150
  • Zhuoran Liu, Zhengyu Zhao, Martha A. Larson: Image Shortcut Squeezing: Countering Perturbative Availability Poisons with Compression. ICML 2023: 22473-22487
  • Asmita Adhikary, Ileana Buhan: SoK: Assisted Fault Simulation - Existing Challenges and Opportunities Offered by AI. ACNS Workshops 2023: 178-195

 

2022

  • Lejla Batina, Shivam Bhasin, Dirmanto Jap, Stjepan Picek: SCA Strikes Back: Reverse-Engineering Neural Network Architectures Using Side Channels. IEEE Des. Test 39(4): 7-14 (2022)
  • Servio Paguada, Lejla Batina, Ileana Buhan, Igor Armendariz: Playing With Blocks: Toward Re-Usable Deep Learning Models for Side-Channel Profiled Attacks. IEEE Trans. Inf. Forensics Secur. 17: 2835-2847 (2022)
  • Unai Rioja, Lejla Batina, Igor Armendariz, Jose Luis Flores: Towards Human Dependency Elimination: AI Approach to SCA Robustness Assessment. IEEE Trans. Inf. Forensics Secur. 17: 3906-3921 (2022)
  • Nicoleta-Norica Bacuieti, Lejla Batina, Stjepan Picek: Deep Neural Networks Aiding Cryptanalysis: A Case Study of the Speck Distinguisher. ACNS 2022: 809-829
  • Ileana Buhan, Lejla Batina, Yuval Yarom, Patrick Schaumont: SoK: Design Tools for Side-Channel-Aware Implementations. AsiaCCS 2022: 756-770
  • Naila Mukhtar, Louiza Papachristodoulou, Apostolos P. Fournaris, Lejla Batina, Yinan Kong: Machine-Learning Assisted Side-Channel Attacks on RNS ECC Implementations Using Hybrid Feature Engineering. COSADE 2022: 3-28
  • Naila Mukhtar, Lejla Batina, Stjepan Picek, Yinan Kong: Fake It Till You Make It: Data Augmentation Using Generative Adversarial Networks for All the Crypto You Need on Small Devices. CT-RSA 2022: 297-321
  • Lejla Batina, Shivam Bhasin, Jakub Breier, Xiaolu Hou, Dirmanto Jap: On Implementation-Level Security of Edge-Based Machine Learning Models. Security and Artificial Intelligence 2022: 335-359
  • Lichao Wu, Leo Weissbart, Marina Krcek, Huimin Li, Guilherme Perin, Lejla Batina, Stjepan Picek: AGE Is Not Just a Number: Label Distribution in Deep Learning-based Side-channel Analysis. IACR Cryptol. ePrint Arch. 2022: 1507 (2022)
  • Jurian van Geest, Ileana Buhan: A Side-Channel Based Disassembler for the ARM-Cortex M0. ACNS Workshops 2022: 183-199
  • Asmita Adhikary, Ileana Buhan: SoK: Getting started with open-source fault simulation tools. IACR Cryptol. ePrint Arch. 2022: 1675 (2022)
  • Estuardo Alpirez Bock, Lukasz Chmielewski, Konstantina Miteloudi: Protecting the Most Significant Bits in Scalar Multiplication Algorithms. SPACE 2022: 118-137
  • Azade Rezaeezade, Guilherme Perin, Stjepan Picek: To Overfit, or Not to Overfit: Improving the Performance of Deep Learning-Based SCA. AFRICACRYPT 2022: 397-421
  • Azade Rezaeezade, Lejla Batina: Regularizers to the Rescue: Fighting Overfitting in Deep Learning-based Side-channel Analysis. IACR Cryptol. ePrint Arch. 2022: 1737 (2022)

 

2021

  • Servio Paguada, Lejla Batina, Igor Armendariz: Toward practical autoencoder-based side-channel analysis evaluations. Comput. Networks 196: 108230 (2021)
  • Unai Rioja, Lejla Batina, Jose Luis Flores, Igor Armendariz: Auto-tune POIs: Estimation of distribution algorithms for efficient side-channel analysis. Comput. Networks 198: 108405 (2021)
  • Unai Rioja, Servio Paguada, Lejla Batina, Igor Armendariz: The Uncertainty of Side-channel Analysis: A Way to Leverage from Heuristics. ACM J. Emerg. Technol. Comput. Syst. 17(3): 40:1-40:27 (2021)
  • Guilherme Perin, Lukasz Chmielewski, Lejla Batina, Stjepan Picek: Keep it Unsupervised: Horizontal Attacks Meet Deep Learning. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(1): 343-372 (2021)
  • Madura A. Shelton, Lukasz Chmielewski, Niels Samwel, Markus Wagner, Lejla Batina, Yuval Yarom: Rosita++: Automatic Higher-Order Leakage Elimination from Cryptographic Code. CCS 2021: 685-699
  • Lejla Batina, Rosario Cammarota, Nele Mentens, Ahmad-Reza Sadeghi, Johanna Sepúlveda, Shaza Zeitouni: Invited: Security Beyond Bulk Silicon: Opportunities and Challenges of Emerging Devices. DAC 2021: 1-4
  • Unai Rioja, Lejla Batina, Jose Luis Flores, Igor Armendariz: Towards Automatic and Portable Data Loading Template Attacks on Microcontrollers. ISQED 2021: 437-443
  • Zhuoran Liu, Niels Samwel, Leo Weissbart, Zhengyu Zhao, Dirk Lauret, Lejla Batina, Martha A. Larson: Screen Gleaning: A Screen Reading TEMPEST Attack on Mobile Devices Exploiting an Electromagnetic Side Channel. NDSS 2021
  • Madura A. Shelton, Niels Samwel, Lejla Batina, Francesco Regazzoni, Markus Wagner, Yuval Yarom: Rosita: Towards Automatic Elimination of Power-Analysis Leakage in Ciphers. NDSS 2021
  • Konstantina Miteloudi, Lejla Batina, Joan Daemen, Nele Mentens: ROCKY: Rotation Countermeasure for the Protection of Keys and Other Sensitive Data. SAMOS 2021: 288-299
  • Konstantina Miteloudi, Lukasz Chmielewski, Lejla Batina, Nele Mentens: Evaluating the ROCKY Countermeasure for Side-Channel Leakage. VLSI-SoC 2021: 1-6
  • Lejla Batina, Milena Djukanovic, Annelie Heuser, Stjepan Picek: It Started with Templates: The Future of Profiling in Side-Channel Analysis. Security of Ubiquitous Computing Systems 2021: 133-145
  • Ileana Buhan, Lejla Batina, Yuval Yarom, Patrick Schaumont: SoK: Design Tools for Side-Channel-Aware Implementions. CoRR abs/2104.08593 (2021)
  • Unai Rioja, Lejla Batina, Igor Armendariz, Jose Luis Flores: Keep It Unbiased: A Comparison Between Estimation of Distribution Algorithms and Deep Learning for Human Interaction-Free Side-Channel Analysis. CoRR abs/2111.13425 (2021)
  • Servio Paguada, Lejla Batina, Ileana Buhan, Igor Armendariz: Being Patient and Persistent: Optimizing An Early Stopping Strategy for Deep Learning in Profiled Attacks. CoRR abs/2111.14416 (2021)
  • Lejla Batina, Lukasz Chmielewski, Björn Haase, Niels Samwel, Peter Schwabe: SCA-secure ECC in software - mission impossible? IACR Cryptol. ePrint Arch. 2021: 1003 (2021)
  • Stjepan Picek, Guilherme Perin, Luca Mariot, Lichao Wu, Lejla Batina: SoK: Deep Learning-based Physical Side-channel Analysis. IACR Cryptol. ePrint Arch. 2021: 1092 (2021)
  • Omid Bazangani, Alexandre Iooss, Ileana Buhan, Lejla Batina: ABBY: Automating the creation of fine-grained leakage models. IACR Cryptol. ePrint Arch. 2021: 1569 (2021)
  • Vipul Arora, Ileana Buhan, Guilherme Perin, Stjepan Picek: A Tale of Two Boards: On the Influence of Microarchitecture on Side-Channel Leakage. CARDIS 2021: 80-96
  • Guilherme Perin, Ileana Buhan, Stjepan Picek: Learning When to Stop: A Mutual Information Approach to Prevent Overfitting in Profiled Side-Channel Analysis. COSADE 2021: 53-81
  • Lukasz Chmielewski, Leo Weissbart: On Reverse Engineering Neural Network Implementation on GPU. ACNS Workshops 2021: 96-113

 

2020

  • Leo Weissbart, Lukasz Chmielewski, Stjepan Picek, Lejla Batina: Systematic Side-Channel Analysis of Curve25519 with Machine Learning. J. Hardw. Syst. Secur. 4(4): 314-328 (2020)
  • Pedro Maat C. Massolino, Patrick Longa, Joost Renes, Lejla Batina: A Compact and Scalable Hardware/Software Co-design of SIKE. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(2): 245-271 (2020)
  • Niels Roelofs, Niels Samwel, Lejla Batina, Joan Daemen: Online Template Attack on ECDSA: - Extracting Keys via the Other Side. AFRICACRYPT 2020: 323-336
  • Unai Rioja, Lejla Batina, Igor Armendariz: When Similarities Among Devices are Taken for Granted: Another Look at Portability. AFRICACRYPT 2020: 337-357
  • Ievgen Kabin, Zoya Dyka, Dan Klann, Nele Mentens, Lejla Batina, Peter Langendörfer: Breaking a fully Balanced ASIC Coprocessor Implementing Complete Addition Formulas on Weierstrass Elliptic Curves. DSD 2020: 270-276
  • Thierry Simon, Lejla Batina, Joan Daemen, Vincent Grosso, Pedro Maat Costa Massolino, Kostas Papagiannopoulos, Francesco Regazzoni, Niels Samwel: Friet: An Authenticated Encryption Scheme with Built-in Fault Detection. EUROCRYPT (1) 2020: 581-611
  • Lichao Wu,Leo Weissbart, Marina Krcek, Huimin Li, Guilherme Perin, Lejla Batina, Stjepan Picek: Everything is Connected: From Model Learnability to Guessing Entropy. IACR Cryptol. ePrint Arch. 2020: 899 (2020)
  • Naila Mukhtar, Louiza Papachristodoulou, Apostolos P. Fournaris, Lejla Batina, Yinan Kong: Machine-Learning assisted Side-Channel Attacks on RNS-based Elliptic Curve Implementations using Hybrid Feature Engineering. IACR Cryptol. ePrint Arch. 2020: 1065 (2020)
  • Leo Weissbart: Performance Analysis of Multilayer Perceptron in Profiling Side-Channel Analysis. ACNS Workshops 2020: 198-216