Jakub Breier

Orcid: 0000-0002-7844-5267

According to our database1, Jakub Breier authored at least 81 papers between 2011 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Another Look at Side-Channel-Resistant Encoding Schemes.
IEEE Trans. Very Large Scale Integr. Syst., August, 2024

Side-Channel and Fault Resistant ASCON Implementation: A Detailed Hardware Evaluation (Extended Version).
IACR Cryptol. ePrint Arch., 2024

DL-SITM: Deep Learning-Based See-in-the-Middle Attack on AES.
IACR Cryptol. ePrint Arch., 2024

DeepBaR: Fault Backdoor Attack on Deep Neural Network Layers.
CoRR, 2024

Side-Channel Analysis of OpenVINO-based Neural Network Models.
CoRR, 2024

DeepNcode: Encoding-Based Protection against Bit-Flip Attacks on Neural Networks.
CoRR, 2024

Side-Channel and Fault Resistant ASCON Implementation: A Detailed Hardware Evaluation.
Proceedings of the IEEE Computer Society Annual Symposium on VLSI, 2024

RMF: A Risk Measurement Framework for Machine Learning Models.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024

2023
FooBaR: Fault Fooling Backdoor Attack on Neural Network Training.
IEEE Trans. Dependable Secur. Comput., 2023

BAKSHEESH: Similar Yet Different From GIFT.
IACR Cryptol. ePrint Arch., 2023

A Survey on Fault Attacks on Symmetric Key Cryptosystems.
ACM Comput. Surv., 2023

New Results on Machine Learning-Based Distinguishers.
IEEE Access, 2023

A Desynchronization-Based Countermeasure Against Side-Channel Analysis of Neural Networks.
Proceedings of the Cyber Security, Cryptology, and Machine Learning, 2023

2022
On Implementation-Level Security of Edge-Based Machine Learning Models.
Security and Artificial Intelligence, 2022

SNIFF: Reverse Engineering of Neural Networks With Fault Attacks.
IEEE Trans. Reliab., 2022

SBCMA: Semi-Blind Combined Middle-Round Attack on Bit-Permutation Ciphers With Application to AEAD Schemes.
IEEE Trans. Inf. Forensics Secur., 2022

Side Channel Attack On Stream Ciphers: A Three-Step Approach To State/Key Recovery.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022

A Finer-Grain Analysis of the Leakage (Non) Resilience of OCB.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022

Quantum Implementation and Analysis of DEFAULT.
IACR Cryptol. ePrint Arch., 2022

Big Brother Is Watching You: A Closer Look At Backdoor Construction.
IACR Cryptol. ePrint Arch., 2022

How Practical Are Fault Injection Attacks, Really?
IEEE Access, 2022

2021
Back to the Basics: Seamless Integration of Side-Channel Pre-Processing in Deep Neural Networks.
IEEE Trans. Inf. Forensics Secur., 2021

On Evaluating Fault Resilient Encoding Schemes in Software.
IEEE Trans. Dependable Secur. Comput., 2021

DEFAULT: Cipher Level Resistance Against Differential Fault Attack.
IACR Cryptol. ePrint Arch., 2021

Feeding Three Birds With One Scone: A Generic Duplication Based Countermeasure To Fault Attacks.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2021

2020
On Side Channel Vulnerabilities of Bit Permutations in Cryptographic Algorithms.
IEEE Trans. Inf. Forensics Secur., 2020

SITM: See-In-The-Middle Side-Channel Assisted Middle Round Differential Cryptanalysis on SPN Block Ciphers.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020

A Countermeasure Against Statistical Ineffective Fault Analysis.
IEEE Trans. Circuits Syst., 2020

Neural Network-based Inherently Fault-tolerant Hardware Cryptographic Primitives without Explicit Redundancy Checks.
ACM J. Emerg. Technol. Comput. Syst., 2020

DNFA: Differential No-Fault Analysis of Bit Permutation Based Ciphers Assisted by Side-Channel.
IACR Cryptol. ePrint Arch., 2020

Machine Learning Assisted Differential Distinguishers For Lightweight Ciphers.
IACR Cryptol. ePrint Arch., 2020

Fault Attacks In Symmetric Key Cryptosystems.
IACR Cryptol. ePrint Arch., 2020

Feeding Three Birds With One Scone: A Generic Duplication Based Countermeasure To Fault Attacks (Extended Version).
IACR Cryptol. ePrint Arch., 2020

Risk Management Framework for Machine Learning Security.
CoRR, 2020

2019
Fully Automated Differential Fault Analysis on Software Implementations of Block Ciphers.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2019

SCADFA: Combined SCA+DFA Attacks on Block Ciphers with Practical Validations.
IEEE Trans. Computers, 2019

SoK : On DFA Vulnerabilities of Substitution-Permutation Networks.
IACR Cryptol. ePrint Arch., 2019

Experimental Evaluation of Deep Neural Network Resistance Against Fault Injection Attacks.
IACR Cryptol. ePrint Arch., 2019

Enhancing Fault Tolerance of Neural Networks for Security-Critical Applications.
CoRR, 2019

2018
Fault Attacks Made Easy: Differential Fault Analysis Automation on Assembly Code.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018

Fully Automated Differential Fault Analysis on Software Implementations of Cryptographic Algorithms.
IACR Cryptol. ePrint Arch., 2018

On Side-Channel Vulnerabilities of Bit Permutations: Key Recovery and Reverse Engineering.
IACR Cryptol. ePrint Arch., 2018

Fault Resilient Encoding Schemes in Software: How Far Can We Go?
IACR Cryptol. ePrint Arch., 2018

Protecting Block Ciphers against Differential Fault Attacks without Re-keying (Extended Version).
IACR Cryptol. ePrint Arch., 2018

PPAP and iPPAP: PLL-Based Protection Against Physical Attacks.
Proceedings of the 2018 IEEE Computer Society Annual Symposium on VLSI, 2018

Protecting block ciphers against differential fault attacks without re-keying.
Proceedings of the 2018 IEEE International Symposium on Hardware Oriented Security and Trust, 2018

Breaking Redundancy-Based Countermeasures with Random Faults and Power Side Channel.
Proceedings of the 2018 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2018

DFARPA: Differential fault attack resistant physical design automation.
Proceedings of the 2018 Design, Automation & Test in Europe Conference & Exhibition, 2018

Practical Fault Attack on Deep Neural Networks.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
A Dynamic Rule Creation Based Anomaly Detection Method for Identifying Security Breaches in Log Records.
Wirel. Pers. Commun., 2017

Attacks in Reality: the Limits of Concurrent Error Detection Codes Against Laser Fault Injection.
J. Hardw. Syst. Secur., 2017

Extensive Laser Fault Injection Profiling of 65 nm FPGA.
J. Hardw. Syst. Secur., 2017

A study on analyzing side-channel resistant encoding schemes with respect to fault attacks.
J. Cryptogr. Eng., 2017

One Plus One is More than Two: A Practical Combination of Power and Fault Analysis Attacks on PRESENT and PRESENT-like Block Ciphers.
IACR Cryptol. ePrint Arch., 2017

A Practical Fault Attack on ARX-like Ciphers with a Case Study on ChaCha20.
IACR Cryptol. ePrint Arch., 2017

SCADPA: Side-Channel Assisted Differential-Plaintext Attack on Bit Permutation Based Ciphers.
IACR Cryptol. ePrint Arch., 2017

Fault Attacks Made Easy: Differential Fault Analysis Automation on Assembly Code.
IACR Cryptol. ePrint Arch., 2017

An electromagnetic fault injection sensor using Hogge phase-detector.
Proceedings of the 18th International Symposium on Quality Electronic Design, 2017

An FPGA-compatible PLL-based sensor against fault injection attack.
Proceedings of the 22nd Asia and South Pacific Design Automation Conference, 2017

2016
Mistakes Are Proof That You Are Trying: On Verifying Software Encoding Schemes' Resistance to Fault Injection Attacks.
IACR Cryptol. ePrint Arch., 2016

Feeding Two Cats with One Bowl: On Designing a Fault and Side-Channel Resistant Software Encoding Scheme.
IACR Cryptol. ePrint Arch., 2016

On Analyzing Program Behavior Under Fault Injection Attacks.
IACR Cryptol. ePrint Arch., 2016

Comprehensive Laser Sensitivity Profiling and Data Register Bit-Flips for Cryptographic Fault Attacks in 65 Nm FPGA.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2016

Cheap and Cheerful: A Low-Cost Digital Sensor for Detecting Laser Fault Injection Attacks.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2016

On determining optimal parameters for testing devices against laser fault attacks.
Proceedings of the International Symposium on Integrated Circuits, 2016

The other side of the coin: Analyzing software encoding schemes against fault injection attacks.
Proceedings of the 2016 IEEE International Symposium on Hardware Oriented Security and Trust, 2016

Ring Oscillator under Laser: Potential of PLL-based Countermeasure against Laser Fault Injection.
Proceedings of the 2016 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2016

Bypassing Parity Protected Cryptography using Laser Fault Injection in Cyber-Physical System.
Proceedings of the 2nd ACM International Workshop on Cyber-Physical System Security, 2016

2015
Multiple Fault Attack on PRESENT with a Hardware Trojan Implementation in FPGA.
Proceedings of the 2015 International Workshop on Secure Internet of Things, 2015

Differential Fault Attack on LEA.
Proceedings of the Information and Communication Technology, 2015

Testing Feasibility of Back-Side Laser Fault Injection on a Microcontroller.
Proceedings of the 10th Workshop on Embedded Systems Security, 2015

Laser Profiling for the Back-Side Fault Attacks: With a Practical Laser Skip Instruction Attack on AES.
Proceedings of the 1st ACM Workshop on Cyber-Physical System Security, 2015

2014
Asset Valuation Method for Dependent Entities.
J. Internet Serv. Inf. Secur., 2014

Overview of machine learning based side-channel analysis methods.
Proceedings of the 2014 International Symposium on Integrated Circuits (ISIC), 2014

A survey of the state-of-the-art fault attacks.
Proceedings of the 2014 International Symposium on Integrated Circuits (ISIC), 2014

Assets Dependencies Model in Information Security Risk Management.
Proceedings of the Information and Communication Technology, 2014

Qualified Electronic Signature via SIM Card Using JavaCard 3 Connected Edition Platform.
Proceedings of the Ninth International Conference on Availability, 2014

2013
On Identifying Proper Security Mechanisms.
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013

On Selecting Critical Security Controls.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2012
Towards a security evaluation model based on security metrics.
Proceedings of the 2012 Conference on Computer Systems and Technologies, 2012

2011
Risk analysis supported by information security metrics.
Proceedings of the 12th International Conference on Computer Systems and Technologies, 2011


  Loading...