Annelie Heuser
Orcid: 0000-0002-1095-5420
According to our database1,
Annelie Heuser
authored at least 63 papers
between 2011 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
IEEE Des. Test, 2024
2023
Proceedings of the 30th Computer & Electronics Security Application Rendezvous Conference (C&ESAR 2023) co-located with the 8th European Cyber Week (ECW 2023), 2023
2022
Security and Artificial Intelligence, 2022
Proceedings of the 25th International Symposium on Research in Attacks, 2022
2021
Proceedings of the Progress in Cryptology - LATINCRYPT 2021, 2021
Poster: Obfuscation Revealed - Using Electromagnetic Emanation to Identify and Classify Malware.
Proceedings of the IEEE European Symposium on Security and Privacy, 2021
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021
Proceedings of the Smart Card Research and Advanced Applications, 2021
Proceedings of the Smart Card Research and Advanced Applications, 2021
Obfuscation Revealed: Leveraging Electromagnetic Signals for Obfuscated Malware Classification.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021
Accurate and Robust Malware Analysis through Similarity of External Calls Dependency Graphs (ECDG).
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021
Proceedings of the Security of Ubiquitous Computing Systems, 2021
2020
IACR Cryptol. ePrint Arch., 2020
Towards Secure Composition of Integrated Circuits and Electronic Systems: On the Role of EDA.
Proceedings of the 2020 Design, Automation & Test in Europe Conference & Exhibition, 2020
2019
IEEE Trans. Very Large Scale Integr. Syst., 2019
The Curse of Class Imbalance and Conflicting Metrics with Machine Learning for Side-channel Evaluations.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2019
Make Some Noise. Unleashing the Power of Convolutional Neural Networks for Profiled Side-channel Analysis.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2019
IEEE Trans. Computers, 2019
IACR Cryptol. ePrint Arch., 2019
Mind the Portability: A Warriors Guide through Realistic Profiled Side-channel Analysis.
IACR Cryptol. ePrint Arch., 2019
An automated and scalable formal process for detecting fault injection vulnerabilities in binaries.
Concurr. Comput. Pract. Exp., 2019
2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
On the optimality and practicability of mutual information analysis in some scenarios.
Cryptogr. Commun., 2018
Proceedings of the Verification, Model Checking, and Abstract Interpretation, 2018
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2018
Proceedings of the Smart Card Research and Advanced Applications, 2018
Proceedings of the Cyber-Physical Systems Security., 2018
2017
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2017
J. Cryptogr. Eng., 2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2017
Proceedings of the 2017 International Joint Conference on Neural Networks, 2017
Proceedings of the Computing Frontiers Conference, 2017
Proceedings of the Codes, Cryptology and Information Security, 2017
Climbing Down the Hierarchy: Hierarchical Classification for Machine Learning Side-Channel Attacks.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2017, 2017
Proceedings of the Applied Cryptography and Network Security, 2017
2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
Proceedings of the IEEE International Symposium on Information Theory, 2016
Taylor Expansion of Maximum Likelihood Attacks for Masked and Shuffled Implementations.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016
2015
IACR Cryptol. ePrint Arch., 2015
2014
Practical improvements of side-channel attacks on AES: feedback from the 2nd DPA contest.
J. Cryptogr. Eng., 2014
Attacking Suggest Boxes in Web Applications Over HTTPS Using Side-Channel Stochastic Algorithms.
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
A Theoretical Study of Kolmogorov-Smirnov Distinguishers: Side-Channel Analysis vs. Differential Cryptanalysis.
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
2013
From cryptography to hardware: analyzing and protecting embedded Xilinx BRAM for cryptographic applications.
J. Cryptogr. Eng., 2013
2012
Proceedings of the Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2012
Proceedings of the 2012 Design, Automation & Test in Europe Conference & Exhibition, 2012
A New Difference Method for Side-Channel Analysis with High-Dimensional Leakage Models.
Proceedings of the Topics in Cryptology - CT-RSA 2012 - The Cryptographers' Track at the RSA Conference 2012, San Francisco, CA, USA, February 27, 2012
Intelligent Machine Homicide - Breaking Cryptographic Devices Using Support Vector Machines.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2012
2011
How a Symmetry Metric Assists Side-Channel Evaluation - A Novel Model Verification Method for Power Analysis.
Proceedings of the 14th Euromicro Conference on Digital System Design, 2011