Ileana Buhan

Orcid: 0000-0001-5494-9164

According to our database1, Ileana Buhan authored at least 35 papers between 2006 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Towards Explainable Side-Channel Leakage: Unveiling the Secrets of Microarchitecture.
IACR Cryptol. ePrint Arch., 2024

Plan your defense: A comparative analysis of leakage detection methods on RISC-V cores.
IACR Cryptol. ePrint Arch., 2024

ABBY: Automating leakage modelling for side-channel analysis.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024

PROACT - Physical Attack Resistance of Cryptographic Algorithms and Circuits with Reduced Time to Market.
Proceedings of the Applied Reconfigurable Computing. Architectures, Tools, and Applications, 2024

2023
SoK: Assisted Fault Simulation - Existing Challenges and Opportunities Offered by AI.
Proceedings of the Applied Cryptography and Network Security Workshops, 2023

2022
Playing With Blocks: Toward Re-Usable Deep Learning Models for Side-Channel Profiled Attacks.
IEEE Trans. Inf. Forensics Secur., 2022

A side-channel based disassembler for the ARM-Cortex M0.
IACR Cryptol. ePrint Arch., 2022

SoK: Getting started with open-source fault simulation tools.
IACR Cryptol. ePrint Arch., 2022

2021
SoK: Design Tools for Side-Channel-Aware Implementations.
IACR Cryptol. ePrint Arch., 2021

ABBY: Automating the creation of fine-grained leakage models.
IACR Cryptol. ePrint Arch., 2021

A Tale of Two Boards: On the Influence of Microarchitecture on Side-Channel Leakage.
IACR Cryptol. ePrint Arch., 2021

Being Patient and Persistent: Optimizing An Early Stopping Strategy for Deep Learning in Profiled Attacks.
CoRR, 2021

SoK: Design Tools for Side-Channel-Aware Implementions.
CoRR, 2021

Learning When to Stop: A Mutual Information Approach to Prevent Overfitting in Profiled Side-Channel Analysis.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2021

2020
Learning when to stop: a mutual information approach to fight overfitting in profiled side-channel analysis.
IACR Cryptol. ePrint Arch., 2020

A Systematic Appraisal of Side Channel Evaluation Strategies.
IACR Cryptol. ePrint Arch., 2020

2019
Machine learning and side channel analysis in a CTF competition.
IACR Cryptol. ePrint Arch., 2019

2016
LDA-Based Clustering as a Side-Channel Distinguisher.
IACR Cryptol. ePrint Arch., 2016

2012
Maximum Key Size and Classification Performance of Fuzzy Commitment for Gaussian Modeled Biometric Sources.
IEEE Trans. Inf. Forensics Secur., 2012

2011
Preventing the Decodability Attack Based Cross-Matching in a Fuzzy Commitment Scheme.
IEEE Trans. Inf. Forensics Secur., 2011

Evaluation of a template protection approach to integrate fingerprint biometrics in a PIN-based payment infrastructure.
Electron. Commer. Res. Appl., 2011

2010
Embedding renewable cryptographic keys into noisy data.
Int. J. Inf. Sec., 2010

Efficient strategies to play the indistinguishability game for fuzzy sketches.
Proceedings of the 2010 IEEE International Workshop on Information Forensics and Security, 2010

Contextual Biometric-Based Authentication for Ubiquitous Services.
Proceedings of the Ubiquitous Intelligence and Computing - 7th International Conference, 2010

A Survey of the Security and Privacy Measures for Anonymous Biometric Authentication Systems.
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010

2009
Secure pairing with biometrics.
Int. J. Secur. Networks, 2009

Fuzzy extractors for continuous distributions.
IACR Cryptol. ePrint Arch., 2009

Biometric template protection - The need for open standards.
Datenschutz und Datensicherheit, 2009

A Quantitative Analysis of Indistinguishability for a Continuous Domain Biometric Cryptosystem.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2009

2008
Cryptographic keys from noisy data, theory and applications.
PhD thesis, 2008

Embedding Renewable Cryptographic Keys into Continuous Noisy Data.
Proceedings of the Information and Communications Security, 10th International Conference, 2008

Controlling leakage of biometric information using dithering.
Proceedings of the 2008 16th European Signal Processing Conference, 2008

2007
Feeling Is Believing: A Secure Template Exchange Protocol.
Proceedings of the Advances in Biometrics, International Conference, 2007

Fuzzy extractors for continuous distributions.
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007

2006
A False Rejection Oriented Threat Model for the Design of Biometric Authentication Systems.
Proceedings of the Advances in Biometrics, International Conference, 2006


  Loading...