default search action
BibTeX records: Annelie Heuser
@article{DBLP:journals/dt/PicekHJB024, author = {Stjepan Picek and Annelie Heuser and Alan Jovic and Shivam Bhasin and Francesco Regazzoni}, title = {Tipping the Balance: Imbalanced Classes in Deep-Learning Side-Channel Analysis}, journal = {{IEEE} Des. Test}, volume = {41}, number = {2}, pages = {32--38}, year = {2024}, url = {https://doi.org/10.1109/MDAT.2023.3288808}, doi = {10.1109/MDAT.2023.3288808}, timestamp = {Sat, 16 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dt/PicekHJB024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cesar/0001PH23, author = {Damien Marion and Duy{-}Phuc Pham and Annelie Heuser}, editor = {Gurvan Le Guernic}, title = {When Side-channel Meets Malware (short paper)}, booktitle = {Proceedings of the 30th Computer {\&} Electronics Security Application Rendezvous Conference (C{\&}ESAR 2023) co-located with the 8th European Cyber Week {(ECW} 2023), Rennes, France, November 21-22, 2023}, series = {{CEUR} Workshop Proceedings}, volume = {3610}, pages = {71--77}, publisher = {CEUR-WS.org}, year = {2023}, url = {https://ceur-ws.org/Vol-3610/short-01.pdf}, timestamp = {Fri, 19 Jan 2024 15:08:28 +0100}, biburl = {https://dblp.org/rec/conf/cesar/0001PH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/Pham0H22, author = {Duy{-}Phuc Pham and Damien Marion and Annelie Heuser}, title = {{ULTRA:} Ultimate Rootkit Detection over the Air}, booktitle = {25th International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2022, Limassol, Cyprus, October 26-28, 2022}, pages = {232--251}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3545948.3545962}, doi = {10.1145/3545948.3545962}, timestamp = {Thu, 20 Oct 2022 10:46:43 +0200}, biburl = {https://dblp.org/rec/conf/raid/Pham0H22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lncs/JovicJPH22, author = {Alan Jovic and Dirmanto Jap and Louiza Papachristodoulou and Annelie Heuser}, title = {Traditional Machine Learning Methods for Side-Channel Analysis}, booktitle = {Security and Artificial Intelligence}, pages = {25--47}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-98795-4\_2}, doi = {10.1007/978-3-030-98795-4\_2}, timestamp = {Mon, 02 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/lncs/JovicJPH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/PuodziusZHN21, author = {Cassius Puodzius and Olivier Zendra and Annelie Heuser and Lamine Noureddine}, editor = {Delphine Reinhardt and Tilo M{\"{u}}ller}, title = {Accurate and Robust Malware Analysis through Similarity of External Calls Dependency Graphs {(ECDG)}}, booktitle = {{ARES} 2021: The 16th International Conference on Availability, Reliability and Security, Vienna, Austria, August 17-20, 2021}, pages = {57:1--57:12}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3465481.3470115}, doi = {10.1145/3465481.3470115}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/PuodziusZHN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Pham0MH21, author = {Duy{-}Phuc Pham and Damien Marion and Matthieu Mastio and Annelie Heuser}, title = {Obfuscation Revealed: Leveraging Electromagnetic Signals for Obfuscated Malware Classification}, booktitle = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6 - 10, 2021}, pages = {706--719}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3485832.3485894}, doi = {10.1145/3485832.3485894}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/Pham0MH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/Genevey-MetatHG21, author = {Christophe Genevey{-}Metat and Annelie Heuser and Beno{\^{\i}}t G{\'{e}}rard}, editor = {Vincent Grosso and Thomas P{\"{o}}ppelmann}, title = {Trace-to-Trace Translation for {SCA}}, booktitle = {Smart Card Research and Advanced Applications - 20th International Conference, {CARDIS} 2021, L{\"{u}}beck, Germany, November 11-12, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13173}, pages = {24--43}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-97348-3\_2}, doi = {10.1007/978-3-030-97348-3\_2}, timestamp = {Fri, 01 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cardis/Genevey-MetatHG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/PicekHPG21, author = {Stjepan Picek and Annelie Heuser and Guilherme Perin and Sylvain Guilley}, editor = {Vincent Grosso and Thomas P{\"{o}}ppelmann}, title = {Profiled Side-Channel Analysis in the Efficient Attacker Framework}, booktitle = {Smart Card Research and Advanced Applications - 20th International Conference, {CARDIS} 2021, L{\"{u}}beck, Germany, November 11-12, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13173}, pages = {44--63}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-97348-3\_3}, doi = {10.1007/978-3-030-97348-3\_3}, timestamp = {Thu, 10 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cardis/PicekHPG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/NoureddineHPZ21, author = {Lamine Noureddine and Annelie Heuser and Cassius Puodzius and Olivier Zendra}, editor = {Anupam Joshi and Barbara Carminati and Rakesh M. Verma}, title = {{SE-PAC:} {A} Self-Evolving PAcker Classifier against rapid packers evolution}, booktitle = {{CODASPY} '21: Eleventh {ACM} Conference on Data and Application Security and Privacy, Virtual Event, USA, April 26-28, 2021}, pages = {281--292}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3422337.3447848}, doi = {10.1145/3422337.3447848}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/NoureddineHPZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/PhamMH21, author = {Duy{-}Phuc Pham and Damien Marion and Annelie Heuser}, title = {Poster: Obfuscation Revealed - Using Electromagnetic Emanation to Identify and Classify Malware}, booktitle = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2021, Vienna, Austria, September 6-10, 2021}, pages = {710--712}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/EuroSP51992.2021.00055}, doi = {10.1109/EUROSP51992.2021.00055}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/PhamMH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/latincrypt/Genevey-MetatHG21, author = {Christophe Genevey{-}Metat and Annelie Heuser and Beno{\^{\i}}t G{\'{e}}rard}, editor = {Patrick Longa and Carla R{\`{a}}fols}, title = {Train or Adapt a Deeply Learned Profile?}, booktitle = {Progress in Cryptology - {LATINCRYPT} 2021 - 7th International Conference on Cryptology and Information Security in Latin America, Bogot{\'{a}}, Colombia, October 6-8, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12912}, pages = {213--232}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-88238-9\_11}, doi = {10.1007/978-3-030-88238-9\_11}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/latincrypt/Genevey-MetatHG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/21/BatinaDHP21, author = {Lejla Batina and Milena Djukanovic and Annelie Heuser and Stjepan Picek}, editor = {Gildas Avoine and Julio Hernandez{-}Castro}, title = {It Started with Templates: The Future of Profiling in Side-Channel Analysis}, booktitle = {Security of Ubiquitous Computing Systems}, pages = {133--145}, publisher = {Springer International Publishing}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-10591-4\_8}, doi = {10.1007/978-3-030-10591-4\_8}, timestamp = {Tue, 04 Jul 2023 14:50:55 +0200}, biburl = {https://dblp.org/rec/books/sp/21/BatinaDHP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/HeuserPGM20, author = {Annelie Heuser and Stjepan Picek and Sylvain Guilley and Nele Mentens}, title = {Lightweight Ciphers and Their Side-Channel Resilience}, journal = {{IEEE} Trans. Computers}, volume = {69}, number = {10}, pages = {1434--1448}, year = {2020}, url = {https://doi.org/10.1109/TC.2017.2757921}, doi = {10.1109/TC.2017.2757921}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/HeuserPGM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/date/KnechtelK0HCMDF20, author = {Johann Knechtel and Elif Bilge Kavun and Francesco Regazzoni and Annelie Heuser and Anupam Chattopadhyay and Debdeep Mukhopadhyay and Soumyajit Dey and Yunsi Fei and Yaacov Belenky and Itamar Levi and Tim G{\"{u}}neysu and Patrick Schaumont and Ilia Polian}, title = {Towards Secure Composition of Integrated Circuits and Electronic Systems: On the Role of {EDA}}, booktitle = {2020 Design, Automation {\&} Test in Europe Conference {\&} Exhibition, {DATE} 2020, Grenoble, France, March 9-13, 2020}, pages = {508--513}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.23919/DATE48585.2020.9116483}, doi = {10.23919/DATE48585.2020.9116483}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/date/KnechtelK0HCMDF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/BhasinCHJPS20, author = {Shivam Bhasin and Anupam Chattopadhyay and Annelie Heuser and Dirmanto Jap and Stjepan Picek and Ritu Ranjan Shrivastwa}, title = {Mind the Portability: {A} Warriors Guide through Realistic Profiled Side-channel Analysis}, booktitle = {27th Annual Network and Distributed System Security Symposium, {NDSS} 2020, San Diego, California, USA, February 23-26, 2020}, publisher = {The Internet Society}, year = {2020}, url = {https://www.ndss-symposium.org/ndss-paper/mind-the-portability-a-warriors-guide-through-realistic-profiled-side-channel-analysis/}, timestamp = {Mon, 01 Feb 2021 08:42:10 +0100}, biburl = {https://dblp.org/rec/conf/ndss/BhasinCHJPS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2001-09672, author = {Johann Knechtel and Elif Bilge Kavun and Francesco Regazzoni and Annelie Heuser and Anupam Chattopadhyay and Debdeep Mukhopadhyay and Soumyajit Dey and Yunsi Fei and Yaacov Belenky and Itamar Levi and Tim G{\"{u}}neysu and Patrick Schaumont and Ilia Polian}, title = {Towards Secure Composition of Integrated Circuits and Electronic Systems: On the Role of {EDA}}, journal = {CoRR}, volume = {abs/2001.09672}, year = {2020}, url = {https://arxiv.org/abs/2001.09672}, eprinttype = {arXiv}, eprint = {2001.09672}, timestamp = {Tue, 31 Mar 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2001-09672.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Genevey-MetatGH20, author = {Christophe Genevey{-}Metat and Beno{\^{\i}}t G{\'{e}}rard and Annelie Heuser}, title = {On What to Learn: Train or Adapt a Deeply Learned Profile?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {952}, year = {2020}, url = {https://eprint.iacr.org/2020/952}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Genevey-MetatGH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/Given-WilsonHJL19, author = {Thomas Given{-}Wilson and Annelie Heuser and Nisrine Jafri and Axel Legay}, title = {An automated and scalable formal process for detecting fault injection vulnerabilities in binaries}, journal = {Concurr. Comput. Pract. Exp.}, volume = {31}, number = {23}, year = {2019}, url = {https://doi.org/10.1002/cpe.4794}, doi = {10.1002/CPE.4794}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/concurrency/Given-WilsonHJL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/RoyBGHPM19, author = {Debapriya Basu Roy and Shivam Bhasin and Sylvain Guilley and Annelie Heuser and Sikhar Patranabis and Debdeep Mukhopadhyay}, title = {{CC} Meets {FIPS:} {A} Hybrid Test Methodology for First Order Side Channel Analysis}, journal = {{IEEE} Trans. Computers}, volume = {68}, number = {3}, pages = {347--361}, year = {2019}, url = {https://doi.org/10.1109/TC.2018.2875746}, doi = {10.1109/TC.2018.2875746}, timestamp = {Wed, 27 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tc/RoyBGHPM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/PicekHJBR19, author = {Stjepan Picek and Annelie Heuser and Alan Jovic and Shivam Bhasin and Francesco Regazzoni}, title = {The Curse of Class Imbalance and Conflicting Metrics with Machine Learning for Side-channel Evaluations}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2019}, number = {1}, pages = {209--237}, year = {2019}, url = {https://doi.org/10.13154/tches.v2019.i1.209-237}, doi = {10.13154/TCHES.V2019.I1.209-237}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/PicekHJBR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/KimPHBH19, author = {Jaehun Kim and Stjepan Picek and Annelie Heuser and Shivam Bhasin and Alan Hanjalic}, title = {Make Some Noise. Unleashing the Power of Convolutional Neural Networks for Profiled Side-channel Analysis}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2019}, number = {3}, pages = {148--179}, year = {2019}, url = {https://doi.org/10.13154/tches.v2019.i3.148-179}, doi = {10.13154/TCHES.V2019.I3.148-179}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/KimPHBH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvlsi/PicekHJB19, author = {Stjepan Picek and Annelie Heuser and Alan Jovic and Lejla Batina}, title = {A Systematic Evaluation of Profiling Through Focused Feature Selection}, journal = {{IEEE} Trans. Very Large Scale Integr. Syst.}, volume = {27}, number = {12}, pages = {2802--2815}, year = {2019}, url = {https://doi.org/10.1109/TVLSI.2019.2937365}, doi = {10.1109/TVLSI.2019.2937365}, timestamp = {Wed, 11 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tvlsi/PicekHJB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PicekHG19, author = {Stjepan Picek and Annelie Heuser and Sylvain Guilley}, title = {Profiling Side-channel Analysis in the Restricted Attacker Framework}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {168}, year = {2019}, url = {https://eprint.iacr.org/2019/168}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PicekHG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BhasinCHJPS19, author = {Shivam Bhasin and Anupam Chattopadhyay and Annelie Heuser and Dirmanto Jap and Stjepan Picek and Ritu Ranjan Shrivastwa}, title = {Mind the Portability: {A} Warriors Guide through Realistic Profiled Side-channel Analysis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {661}, year = {2019}, url = {https://eprint.iacr.org/2019/661}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BhasinCHJPS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/CheriseyGHR18, author = {Eloi de Ch{\'{e}}risey and Sylvain Guilley and Annelie Heuser and Olivier Rioul}, title = {On the optimality and practicability of mutual information analysis in some scenarios}, journal = {Cryptogr. Commun.}, volume = {10}, number = {1}, pages = {101--121}, year = {2018}, url = {https://doi.org/10.1007/s12095-017-0241-x}, doi = {10.1007/S12095-017-0241-X}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/CheriseyGHR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/PicekHJKR18, author = {Stjepan Picek and Annelie Heuser and Alan Jovic and Karlo Knezevic and Tania Richmond}, editor = {Beg{\"{u}}l Bilgin and Jean{-}Bernard Fischer}, title = {Improving Side-Channel Analysis Through Semi-supervised Learning}, booktitle = {Smart Card Research and Advanced Applications, 17th International Conference, {CARDIS} 2018, Montpellier, France, November 12-14, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11389}, pages = {35--50}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-15462-2\_3}, doi = {10.1007/978-3-030-15462-2\_3}, timestamp = {Sat, 30 Sep 2023 09:35:52 +0200}, biburl = {https://dblp.org/rec/conf/cardis/PicekHJKR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/space/PicekSKHBL18, author = {Stjepan Picek and Ioannis Petros Samiotis and Jaehun Kim and Annelie Heuser and Shivam Bhasin and Axel Legay}, editor = {Anupam Chattopadhyay and Chester Rebeiro and Yuval Yarom}, title = {On the Performance of Convolutional Neural Networks for Side-Channel Analysis}, booktitle = {Security, Privacy, and Applied Cryptography Engineering - 8th International Conference, {SPACE} 2018, Kanpur, India, December 15-19, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11348}, pages = {157--176}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-05072-6\_10}, doi = {10.1007/978-3-030-05072-6\_10}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/space/PicekSKHBL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vmcai/BiondiEHLMQ18, author = {Fabrizio Biondi and Michael A. Enescu and Annelie Heuser and Axel Legay and Kuldeep S. Meel and Jean Quilbeuf}, editor = {Isil Dillig and Jens Palsberg}, title = {Scalable Approximation of Quantitative Information Flow in Programs}, booktitle = {Verification, Model Checking, and Abstract Interpretation - 19th International Conference, {VMCAI} 2018, Los Angeles, CA, USA, January 7-9, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10747}, pages = {71--93}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-73721-8\_4}, doi = {10.1007/978-3-319-73721-8\_4}, timestamp = {Tue, 14 May 2019 10:00:43 +0200}, biburl = {https://dblp.org/rec/conf/vmcai/BiondiEHLMQ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/18/DangerGHLT18, author = {Jean{-}Luc Danger and Sylvain Guilley and Annelie Heuser and Axel Legay and Ming Tang}, editor = {{\c{C}}etin Kaya Ko{\c{c}}}, title = {Physical Security Versus Masking Schemes}, booktitle = {Cyber-Physical Systems Security}, pages = {269--284}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-98935-8\_13}, doi = {10.1007/978-3-319-98935-8\_13}, timestamp = {Fri, 13 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/18/DangerGHLT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PicekSHKBL18, author = {Stjepan Picek and Ioannis Petros Samiotis and Annelie Heuser and Jaehun Kim and Shivam Bhasin and Axel Legay}, title = {On the Performance of Deep Learning for Side-channel Analysis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {4}, year = {2018}, url = {http://eprint.iacr.org/2018/004}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PicekSHKBL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PicekHJBR18, author = {Stjepan Picek and Annelie Heuser and Alan Jovic and Shivam Bhasin and Francesco Regazzoni}, title = {The Curse of Class Imbalance and Conflicting Metrics with Machine Learning for Side-channel Evaluations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {476}, year = {2018}, url = {https://eprint.iacr.org/2018/476}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PicekHJBR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KimPHBH18, author = {Jaehun Kim and Stjepan Picek and Annelie Heuser and Shivam Bhasin and Alan Hanjalic}, title = {Make Some Noise: Unleashing the Power of Convolutional Neural Networks for Profiled Side-channel Analysis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1023}, year = {2018}, url = {https://eprint.iacr.org/2018/1023}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KimPHBH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PicekHAR18, author = {Stjepan Picek and Annelie Heuser and Cesare Alippi and Francesco Regazzoni}, title = {When Theory Meets Practice: {A} Framework for Robust Profiled Side-channel Analysis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1123}, year = {2018}, url = {https://eprint.iacr.org/2018/1123}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PicekHAR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/BruneauGHMR17, author = {Nicolas Bruneau and Sylvain Guilley and Annelie Heuser and Damien Marion and Olivier Rioul}, title = {Optimal side-channel attacks for multivariate leakages and multiple models}, journal = {J. Cryptogr. Eng.}, volume = {7}, number = {4}, pages = {331--341}, year = {2017}, url = {https://doi.org/10.1007/s13389-017-0170-9}, doi = {10.1007/S13389-017-0170-9}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/BruneauGHMR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/PicekHG17, author = {Stjepan Picek and Annelie Heuser and Sylvain Guilley}, title = {Template attack versus Bayes classifier}, journal = {J. Cryptogr. Eng.}, volume = {7}, number = {4}, pages = {343--351}, year = {2017}, url = {https://doi.org/10.1007/s13389-017-0172-7}, doi = {10.1007/S13389-017-0172-7}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/PicekHG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcad/TangGHRLD17, author = {Ming Tang and Zhipeng Guo and Annelie Heuser and Yanzhen Ren and Jie Li and Jean{-}Luc Danger}, title = {{PFD} - {A} Flexible Higher-Order Masking Scheme}, journal = {{IEEE} Trans. Comput. Aided Des. Integr. Circuits Syst.}, volume = {36}, number = {8}, pages = {1327--1339}, year = {2017}, url = {https://doi.org/10.1109/TCAD.2016.2629441}, doi = {10.1109/TCAD.2016.2629441}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcad/TangGHRLD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/BruneauCGHPR17, author = {Nicolas Bruneau and Claude Carlet and Sylvain Guilley and Annelie Heuser and Emmanuel Prouff and Olivier Rioul}, title = {Stochastic Collision Attack}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {9}, pages = {2090--2104}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2697401}, doi = {10.1109/TIFS.2017.2697401}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/BruneauCGHPR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/CarletHP17, author = {Claude Carlet and Annelie Heuser and Stjepan Picek}, editor = {Dieter Gollmann and Atsuko Miyaji and Hiroaki Kikuchi}, title = {Trade-Offs for S-Boxes: Cryptographic Properties and Side-Channel Resilience}, booktitle = {Applied Cryptography and Network Security - 15th International Conference, {ACNS} 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10355}, pages = {393--414}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-61204-1\_20}, doi = {10.1007/978-3-319-61204-1\_20}, timestamp = {Tue, 07 May 2024 20:12:06 +0200}, biburl = {https://dblp.org/rec/conf/acns/CarletHP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/PicekHJL17, author = {Stjepan Picek and Annelie Heuser and Alan Jovic and Axel Legay}, editor = {Marc Joye and Abderrahmane Nitaj}, title = {Climbing Down the Hierarchy: Hierarchical Classification for Machine Learning Side-Channel Attacks}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2017 - 9th International Conference on Cryptology in Africa, Dakar, Senegal, May 24-26, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10239}, pages = {61--78}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-57339-7\_4}, doi = {10.1007/978-3-319-57339-7\_4}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/PicekHJL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/c2si/GuilleyHR17, author = {Sylvain Guilley and Annelie Heuser and Olivier Rioul}, editor = {Said El Hajji and Abderrahmane Nitaj and El Mamoun Souidi}, title = {Codes for Side-Channel Attacks and Protections}, booktitle = {Codes, Cryptology and Information Security - Second International Conference, {C2SI} 2017, Rabat, Morocco, April 10-12, 2017, Proceedings - In Honor of Claude Carlet}, series = {Lecture Notes in Computer Science}, volume = {10194}, pages = {35--55}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-55589-8\_3}, doi = {10.1007/978-3-319-55589-8\_3}, timestamp = {Tue, 27 Aug 2019 17:49:45 +0200}, biburl = {https://dblp.org/rec/conf/c2si/GuilleyHR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cf/ContiNHPM17, author = {Mauro Conti and Giorgio Di Natale and Annelie Heuser and Thomas P{\"{o}}ppelmann and Nele Mentens}, title = {Do we need a holistic approach for the design of secure IoT systems?}, booktitle = {Proceedings of the Computing Frontiers Conference, CF'17, Siena, Italy, May 15-17, 2017}, pages = {425--430}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3075564.3079070}, doi = {10.1145/3075564.3079070}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cf/ContiNHPM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ijcnn/PicekHJLGJM17, author = {Stjepan Picek and Annelie Heuser and Alan Jovic and Simone A. Ludwig and Sylvain Guilley and Domagoj Jakobovic and Nele Mentens}, title = {Side-channel analysis and machine learning: {A} practical perspective}, booktitle = {2017 International Joint Conference on Neural Networks, {IJCNN} 2017, Anchorage, AK, USA, May 14-19, 2017}, pages = {4095--4102}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/IJCNN.2017.7966373}, doi = {10.1109/IJCNN.2017.7966373}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ijcnn/PicekHJLGJM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/GuilleyHTR17, author = {Sylvain Guilley and Annelie Heuser and Ming Tang and Olivier Rioul}, editor = {Pooya Farshim and Emil Simion}, title = {Stochastic Side-Channel Leakage Analysis via Orthonormal Decomposition}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 10th International Conference, SecITC 2017, Bucharest, Romania, June 8-9, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10543}, pages = {12--27}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-69284-5\_2}, doi = {10.1007/978-3-319-69284-5\_2}, timestamp = {Thu, 06 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/GuilleyHTR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HeuserPGM17, author = {Annelie Heuser and Stjepan Picek and Sylvain Guilley and Nele Mentens}, title = {Side-channel Analysis of Lightweight Ciphers: Does Lightweight Equal Easy?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {261}, year = {2017}, url = {http://eprint.iacr.org/2017/261}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HeuserPGM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PicekHG17, author = {Stjepan Picek and Annelie Heuser and Sylvain Guilley}, title = {Template Attack vs Bayes Classifier}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {531}, year = {2017}, url = {http://eprint.iacr.org/2017/531}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PicekHG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PicekHJLK17, author = {Stjepan Picek and Annelie Heuser and Alan Jovic and Axel Legay and Karlo Knezevic}, title = {Profiled {SCA} with a New Twist: Semi-supervised Learning}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1085}, year = {2017}, url = {http://eprint.iacr.org/2017/1085}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PicekHJLK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PicekHJBL17, author = {Stjepan Picek and Annelie Heuser and Alan Jovic and Lejla Batina and Axel Legay}, title = {The secrets of profiling for side-channel analysis: feature selection matters}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1110}, year = {2017}, url = {http://eprint.iacr.org/2017/1110}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PicekHJBL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BruneauGHRST16, author = {Nicolas Bruneau and Sylvain Guilley and Annelie Heuser and Olivier Rioul and Fran{\c{c}}ois{-}Xavier Standaert and Yannick Teglia}, editor = {Jung Hee Cheon and Tsuyoshi Takagi}, title = {Taylor Expansion of Maximum Likelihood Attacks for Masked and Shuffled Implementations}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10031}, pages = {573--601}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53887-6\_21}, doi = {10.1007/978-3-662-53887-6\_21}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/BruneauGHRST16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/RioulHGD16, author = {Olivier Rioul and Annelie Heuser and Sylvain Guilley and Jean{-}Luc Danger}, title = {Inter-class vs. mutual information as side-channel distinguishers}, booktitle = {{IEEE} International Symposium on Information Theory, {ISIT} 2016, Barcelona, Spain, July 10-15, 2016}, pages = {805--809}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ISIT.2016.7541410}, doi = {10.1109/ISIT.2016.7541410}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/isit/RioulHGD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rfidsec/HeuserPGM16, author = {Annelie Heuser and Stjepan Picek and Sylvain Guilley and Nele Mentens}, editor = {Gerhard P. Hancke and Konstantinos Markantonakis}, title = {Side-Channel Analysis of Lightweight Ciphers: Does Lightweight Equal Easy?}, booktitle = {Radio Frequency Identification and IoT Security - 12th International Workshop, RFIDSec 2016, Hong Kong, China, November 30 - December 2, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10155}, pages = {91--104}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-62024-4\_7}, doi = {10.1007/978-3-319-62024-4\_7}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/rfidsec/HeuserPGM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BruneauGHMR16, author = {Nicolas Bruneau and Sylvain Guilley and Annelie Heuser and Damien Marion and Olivier Rioul}, title = {Less is More - Dimensionality Reduction from a Theoretical Perspective}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {359}, year = {2016}, url = {http://eprint.iacr.org/2016/359}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BruneauGHMR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BelgarricBBDDGH16, author = {Pierre Belgarric and Shivam Bhasin and Nicolas Bruneau and Jean{-}Luc Danger and Nicolas Debande and Sylvain Guilley and Annelie Heuser and Zakaria Najm and Olivier Rioul}, title = {Time-Frequency Analysis for Second-Order Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {772}, year = {2016}, url = {http://eprint.iacr.org/2016/772}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BelgarricBBDDGH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GuilleyHR16, author = {Sylvain Guilley and Annelie Heuser and Olivier Rioul}, title = {A Key to Success - Success Exponents for Side-Channel Distinguishers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {987}, year = {2016}, url = {http://eprint.iacr.org/2016/987}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GuilleyHR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BruneauGHMR15, author = {Nicolas Bruneau and Sylvain Guilley and Annelie Heuser and Damien Marion and Olivier Rioul}, editor = {Tim G{\"{u}}neysu and Helena Handschuh}, title = {Less is More - Dimensionality Reduction from a Theoretical Perspective}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2015 - 17th International Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9293}, pages = {22--41}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48324-4\_2}, doi = {10.1007/978-3-662-48324-4\_2}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/BruneauGHMR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/GuilleyHR15, author = {Sylvain Guilley and Annelie Heuser and Olivier Rioul}, editor = {Alex Biryukov and Vipul Goyal}, title = {A Key to Success - Success Exponents for Side-Channel Distinguishers}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2015 - 16th International Conference on Cryptology in India, Bangalore, India, December 6-9, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9462}, pages = {270--290}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26617-6\_15}, doi = {10.1007/978-3-319-26617-6\_15}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/GuilleyHR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BruneauGHR15, author = {Nicolas Bruneau and Sylvain Guilley and Annelie Heuser and Olivier Rioul}, title = {Masks will Fall Off - Higher-Order Optimal Distinguishers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {452}, year = {2015}, url = {http://eprint.iacr.org/2015/452}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BruneauGHR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/ClavierDDEGGHKLLNOSSSSVWW14, author = {Christophe Clavier and Jean{-}Luc Danger and Guillaume Duc and M. Abdelaziz Elaabid and Beno{\^{\i}}t G{\'{e}}rard and Sylvain Guilley and Annelie Heuser and Michael Kasper and Yang Li and Victor Lomn{\'{e}} and Daisuke Nakatsu and Kazuo Ohta and Kazuo Sakiyama and Laurent Sauvage and Werner Schindler and Marc St{\"{o}}ttinger and Nicolas Veyrat{-}Charvillon and Matthieu Walle and Antoine Wurcker}, title = {Practical improvements of side-channel attacks on {AES:} feedback from the 2nd {DPA} contest}, journal = {J. Cryptogr. Eng.}, volume = {4}, number = {4}, pages = {259--274}, year = {2014}, url = {https://doi.org/10.1007/s13389-014-0075-9}, doi = {10.1007/S13389-014-0075-9}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/ClavierDDEGGHKLLNOSSSSVWW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/MoradiGH14, author = {Amir Moradi and Sylvain Guilley and Annelie Heuser}, editor = {Ioana Boureanu and Philippe Owesarski and Serge Vaudenay}, title = {Detecting Hidden Leakages}, booktitle = {Applied Cryptography and Network Security - 12th International Conference, {ACNS} 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8479}, pages = {324--342}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-07536-5\_20}, doi = {10.1007/978-3-319-07536-5\_20}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/MoradiGH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BruneauGHR14, author = {Nicolas Bruneau and Sylvain Guilley and Annelie Heuser and Olivier Rioul}, editor = {Palash Sarkar and Tetsu Iwata}, title = {Masks Will Fall Off - Higher-Order Optimal Distinguishers}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8874}, pages = {344--365}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-45608-8\_19}, doi = {10.1007/978-3-662-45608-8\_19}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/BruneauGHR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/HeuserRG14, author = {Annelie Heuser and Olivier Rioul and Sylvain Guilley}, editor = {Lejla Batina and Matthew Robshaw}, title = {Good Is Not Good Enough - Deriving Optimal Distinguishers from Communication Theory}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2014 - 16th International Workshop, Busan, South Korea, September 23-26, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8731}, pages = {55--74}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44709-3\_4}, doi = {10.1007/978-3-662-44709-3\_4}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/HeuserRG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cosade/HeuserRG14, author = {Annelie Heuser and Olivier Rioul and Sylvain Guilley}, editor = {Emmanuel Prouff}, title = {A Theoretical Study of Kolmogorov-Smirnov Distinguishers - Side-Channel Analysis vs. Differential Cryptanalysis}, booktitle = {Constructive Side-Channel Analysis and Secure Design - 5th International Workshop, {COSADE} 2014, Paris, France, April 13-15, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8622}, pages = {9--28}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10175-0\_2}, doi = {10.1007/978-3-319-10175-0\_2}, timestamp = {Tue, 14 May 2019 10:00:39 +0200}, biburl = {https://dblp.org/rec/conf/cosade/HeuserRG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crisis/SchaubSHCJTHGR14, author = {Alexander Schaub and Emmanuel Schneider and Alexandros Hollender and Vinicius Calasans and Laurent Jolie and Robin Touillon and Annelie Heuser and Sylvain Guilley and Olivier Rioul}, editor = {Javier L{\'{o}}pez and Indrajit Ray and Bruno Crispo}, title = {Attacking Suggest Boxes in Web Applications Over {HTTPS} Using Side-Channel Stochastic Algorithms}, booktitle = {Risks and Security of Internet and Systems - 9th International Conference, CRiSIS 2014, Trento, Italy, August 27-29, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8924}, pages = {116--130}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-17127-2\_8}, doi = {10.1007/978-3-319-17127-2\_8}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crisis/SchaubSHCJTHGR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/space/BruneauDGHT14, author = {Nicolas Bruneau and Jean{-}Luc Danger and Sylvain Guilley and Annelie Heuser and Yannick Teglia}, editor = {Rajat Subhra Chakraborty and Vashek Matyas and Patrick Schaumont}, title = {Boosting Higher-Order Correlation Attacks by Dimensionality Reduction}, booktitle = {Security, Privacy, and Applied Cryptography Engineering - 4th International Conference, {SPACE} 2014, Pune, India, October 18-22, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8804}, pages = {183--200}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12060-7\_13}, doi = {10.1007/978-3-319-12060-7\_13}, timestamp = {Mon, 15 Jun 2020 17:10:47 +0200}, biburl = {https://dblp.org/rec/conf/space/BruneauDGHT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HeuserGR14, author = {Annelie Heuser and Sylvain Guilley and Olivier Rioul}, title = {A Theoretical Study of Kolmogorov-Smirnov Distinguishers: Side-Channel Analysis vs. Differential Cryptanalysis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {8}, year = {2014}, url = {http://eprint.iacr.org/2014/008}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HeuserGR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HeuserRG14, author = {Annelie Heuser and Olivier Rioul and Sylvain Guilley}, title = {Good is Not Good Enough: Deriving Optimal Distinguishers from Communication Theory}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {527}, year = {2014}, url = {http://eprint.iacr.org/2014/527}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HeuserRG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BruneauDGHT14, author = {Nicolas Bruneau and Jean{-}Luc Danger and Sylvain Guilley and Annelie Heuser and Yannick Teglia}, title = {Boosting Higher-Order Correlation Attacks by Dimensionality Reduction}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {935}, year = {2014}, url = {http://eprint.iacr.org/2014/935}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BruneauDGHT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SchaubSHCJTHGR14, author = {Alexander Schaub and Emmanuel Schneider and Alexandros Hollender and Vinicius Calasans and Laurent Jolie and Robin Touillon and Annelie Heuser and Sylvain Guilley and Olivier Rioul}, title = {Attacking Suggest Boxes in Web Applications Over {HTTPS} Using Side-Channel Stochastic Algorithms}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {959}, year = {2014}, url = {http://eprint.iacr.org/2014/959}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SchaubSHCJTHGR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/MohamedBZHWB13, author = {Mohamed Saied Emam Mohamed and Stanislav Bulygin and Michael Zohner and Annelie Heuser and Michael Walter and Johannes Buchmann}, title = {Improved algebraic side-channel attack on {AES}}, journal = {J. Cryptogr. Eng.}, volume = {3}, number = {3}, pages = {139--156}, year = {2013}, url = {https://doi.org/10.1007/s13389-013-0059-1}, doi = {10.1007/S13389-013-0059-1}, timestamp = {Mon, 16 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jce/MohamedBZHWB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/BhasinGHD13, author = {Shivam Bhasin and Sylvain Guilley and Annelie Heuser and Jean{-}Luc Danger}, title = {From cryptography to hardware: analyzing and protecting embedded Xilinx {BRAM} for cryptographic applications}, journal = {J. Cryptogr. Eng.}, volume = {3}, number = {4}, pages = {213--225}, year = {2013}, url = {https://doi.org/10.1007/s13389-013-0048-4}, doi = {10.1007/S13389-013-0048-4}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/BhasinGHD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/BelgarricBBDDGHNR13, author = {Pierre Belgarric and Shivam Bhasin and Nicolas Bruneau and Jean{-}Luc Danger and Nicolas Debande and Sylvain Guilley and Annelie Heuser and Zakaria Najm and Olivier Rioul}, editor = {Aur{\'{e}}lien Francillon and Pankaj Rohatgi}, title = {Time-Frequency Analysis for Second-Order Attacks}, booktitle = {Smart Card Research and Advanced Applications - 12th International Conference, {CARDIS} 2013, Berlin, Germany, November 27-29, 2013. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8419}, pages = {108--122}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-08302-5\_8}, doi = {10.1007/978-3-319-08302-5\_8}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cardis/BelgarricBBDDGHNR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MoradiGH13, author = {Amir Moradi and Sylvain Guilley and Annelie Heuser}, title = {Detecting Hidden Leakages}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {842}, year = {2013}, url = {http://eprint.iacr.org/2013/842}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MoradiGH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cosade/HeuserZ12, author = {Annelie Heuser and Michael Zohner}, editor = {Werner Schindler and Sorin A. Huss}, title = {Intelligent Machine Homicide - Breaking Cryptographic Devices Using Support Vector Machines}, booktitle = {Constructive Side-Channel Analysis and Secure Design - Third International Workshop, {COSADE} 2012, Darmstadt, Germany, May 3-4, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7275}, pages = {249--264}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29912-4\_18}, doi = {10.1007/978-3-642-29912-4\_18}, timestamp = {Tue, 14 May 2019 10:00:39 +0200}, biburl = {https://dblp.org/rec/conf/cosade/HeuserZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/HeuserKSS12, author = {Annelie Heuser and Michael Kasper and Werner Schindler and Marc St{\"{o}}ttinger}, editor = {Orr Dunkelman}, title = {A New Difference Method for Side-Channel Analysis with High-Dimensional Leakage Models}, booktitle = {Topics in Cryptology - {CT-RSA} 2012 - The Cryptographers' Track at the {RSA} Conference 2012, San Francisco, CA, USA, February 27 - March 2, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7178}, pages = {365--382}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-27954-6\_23}, doi = {10.1007/978-3-642-27954-6\_23}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/HeuserKSS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/date/HeuserSS12, author = {Annelie Heuser and Werner Schindler and Marc St{\"{o}}ttinger}, editor = {Wolfgang Rosenstiel and Lothar Thiele}, title = {Revealing side-channel issues of complex circuits by enhanced leakage models}, booktitle = {2012 Design, Automation {\&} Test in Europe Conference {\&} Exhibition, {DATE} 2012, Dresden, Germany, March 12-16, 2012}, pages = {1179--1184}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/DATE.2012.6176672}, doi = {10.1109/DATE.2012.6176672}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/date/HeuserSS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/MohamedBZHWB12, author = {Mohamed Saied Emam Mohamed and Stanislav Bulygin and Michael Zohner and Annelie Heuser and Michael Walter and Johannes Buchmann}, title = {Improved algebraic side-channel attack on {AES}}, booktitle = {2012 {IEEE} International Symposium on Hardware-Oriented Security and Trust, {HOST} 2012, San Francisco, CA, USA, June 3-4, 2012}, pages = {146--151}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/HST.2012.6224335}, doi = {10.1109/HST.2012.6224335}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/MohamedBZHWB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iih-msp/TianHH12, author = {Qizhi Tian and Annelie Heuser and Sorin A. Huss}, editor = {George A. Tsihrintzis and Jeng{-}Shyang Pan and Hsiang{-}Cheh Huang and Maria Virvou and Lakhmi C. Jain}, title = {A Novel Analysis Method for Assessing the Side-Channel Resistance of Cryptosystems}, booktitle = {Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, {IIH-MSP} 2012, Piraeus-Athens, Greece, July 18-20, 2012}, pages = {480--485}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/IIH-MSP.2012.122}, doi = {10.1109/IIH-MSP.2012.122}, timestamp = {Mon, 06 Apr 2020 19:01:12 +0200}, biburl = {https://dblp.org/rec/conf/iih-msp/TianHH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MohamedBZHW12, author = {Mohamed Saied Emam Mohamed and Stanislav Bulygin and Michael Zohner and Annelie Heuser and Michael Walter}, title = {Improved Algebraic Side-Channel Attack on {AES}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {84}, year = {2012}, url = {http://eprint.iacr.org/2012/084}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MohamedBZHW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsd/HeuserKSS11, author = {Annelie Heuser and Michael Kasper and Werner Schindler and Marc St{\"{o}}ttinger}, title = {How a Symmetry Metric Assists Side-Channel Evaluation - {A} Novel Model Verification Method for Power Analysis}, booktitle = {14th Euromicro Conference on Digital System Design, Architectures, Methods and Tools, {DSD} 2011, August 31 - September 2, 2011, Oulu, Finland}, pages = {674--681}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/DSD.2011.91}, doi = {10.1109/DSD.2011.91}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsd/HeuserKSS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.