Zobrazeno 1 - 10
of 48
pro vyhledávání: '"Annelie Heuser"'
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2019, Iss 3 (2019)
Profiled side-channel analysis based on deep learning, and more precisely Convolutional Neural Networks, is a paradigm showing significant potential. The results, although scarce for now, suggest that such techniques are even able to break cryptograp
Externí odkaz:
https://doaj.org/article/cbc4a11c56534e53bbfb66676aee867f
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2019, Iss 1 (2018)
We concentrate on machine learning techniques used for profiled sidechannel analysis in the presence of imbalanced data. Such scenarios are realistic and often occurring, for instance in the Hamming weight or Hamming distance leakage models. In order
Externí odkaz:
https://doaj.org/article/aafba2375bae43c8ad2211dd36a827c0
Publikováno v:
Security and Artificial Intelligence ISBN: 9783030987947
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::c482df8bbb85e3c3cbf89099754b5f80
https://doi.org/10.1007/978-3-030-98795-4_2
https://doi.org/10.1007/978-3-030-98795-4_2
Publikováno v:
Smart Card Research and Advanced Applications ISBN: 9783030973476
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::1c7fc4e6943021db653ad59e66f4c5a6
https://doi.org/10.1007/978-3-030-97348-3_3
https://doi.org/10.1007/978-3-030-97348-3_3
Publikováno v:
ACSAC 2021-Annual Computer Security Applications Conference
ACSAC 2021-Annual Computer Security Applications Conference, Dec 2021, Virtual Event, France. pp.1-14, ⟨10.1145/3485832.3485894⟩
ACSAC 2021-Annual Computer Security Applications Conference, Dec 2021, Virtual Event, France. pp.1-14, ⟨10.1145/3485832.3485894⟩
International audience; The Internet of Things (IoT) is constituted of devices that are exponentially growing in number and in complexity. They use numerous customized firmware and hardware, without taking into consideration security issues, which ma
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::77e573fb6aed75ef153a4138092dbaa9
https://hal.archives-ouvertes.fr/hal-03374399/document
https://hal.archives-ouvertes.fr/hal-03374399/document
Publikováno v:
CARDIS 2021-20th Smart Card Research and Advanced Application Conference
CARDIS 2021-20th Smart Card Research and Advanced Application Conference, Nov 2021, Luebeck, Germany
Smart Card Research and Advanced Applications ISBN: 9783030973476
CARDIS 2021-20th Smart Card Research and Advanced Application Conference, Nov 2021, Luebeck, Germany
Smart Card Research and Advanced Applications ISBN: 9783030973476
International audience; Neural Networks (NN) have been built to solve universal function approximation problems. Some architectures as Convolutional Neural Networks (CNN) are dedicated to classification in the context of image distortion. They have n
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::f13b418d2385eb3ebf1e832fcc5b7ae4
https://hal.inria.fr/hal-03553723/document
https://hal.inria.fr/hal-03553723/document
Publikováno v:
LATINCRYPT 2021-7th International Conference on Cryptology and Information Security in Latin America
LATINCRYPT 2021-7th International Conference on Cryptology and Information Security in Latin America, Oct 2021, Bogota, Colombia. ⟨10.1007/978-3-030-88238-9_11⟩
Progress in Cryptology – LATINCRYPT 2021 ISBN: 9783030882372
LATINCRYPT
LATINCRYPT 2021-7th International Conference on Cryptology and Information Security in Latin America, Oct 2021, Bogota, Colombia. ⟨10.1007/978-3-030-88238-9_11⟩
Progress in Cryptology – LATINCRYPT 2021 ISBN: 9783030882372
LATINCRYPT
International audience; In recent years, many papers have shown that deep learning can be beneficial for profiled side-channel analysis. However, to obtain good performance with deep learning, an evaluator or an attacker face the issue of data. Due t
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::e8f379d3305d7003abef361eae1a752f
https://hal.inria.fr/hal-03458681
https://hal.inria.fr/hal-03458681
Publikováno v:
EuroS&P 2021-6th IEEE European Symposium on Security and Privacy
EuroS&P 2021-6th IEEE European Symposium on Security and Privacy, Sep 2021, online, Austria. pp.1-1, 2021, ⟨10.1109/eurosp51992.2021.00055⟩
EuroS&P
EuroS&P 2021-6th IEEE European Symposium on Security and Privacy, Sep 2021, online, Austria. pp.1-1, 2021, ⟨10.1109/eurosp51992.2021.00055⟩
EuroS&P
International audience; In this poster we present a novel approach of using side channel information to identify the kinds of malware threats that are targeting IoT devices. Although in the presence of obfuscation techniques that can prevent static o
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::b6b46d89867f2eee4c01e67c49c22719
https://inria.hal.science/hal-03458819/file/Poster_Euro_S_P_2021.pdf
https://inria.hal.science/hal-03458819/file/Poster_Euro_S_P_2021.pdf
Publikováno v:
IWCC 2021-10th International Workshop on Cyber Crime (held in conjunction with ARES 2021)
ARES 2021-The 16th International Conference on Availability, Reliability and Security
ARES 2021-The 16th International Conference on Availability, Reliability and Security, Aug 2021, Virtual, Austria. pp.1-12, ⟨10.1145/3465481.3470115⟩
ARES
ARES 2021-The 16th International Conference on Availability, Reliability and Security
ARES 2021-The 16th International Conference on Availability, Reliability and Security, Aug 2021, Virtual, Austria. pp.1-12, ⟨10.1145/3465481.3470115⟩
ARES
This paper received the Best Paper Award for IWCC 2021; International audience; Malware is a primary concern in cybersecurity, being one of the attacker's favorite cyberweapons. Over time, malware evolves not only in complexity but also in diversity
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::7820e0ee967de2aa9c8e6a1bb141af0c
https://hal.science/hal-03328395
https://hal.science/hal-03328395
Publikováno v:
CODASPY '21-11th ACM Conference on Data and Application Security and Privacy
CODASPY '21-11th ACM Conference on Data and Application Security and Privacy, Apr 2021, Virtual Event, United States. pp.1-12, ⟨10.1145/3422337.3447848⟩
CODASPY
CODASPY '21-11th ACM Conference on Data and Application Security and Privacy, Apr 2021, Virtual Event, United States. pp.1-12, ⟨10.1145/3422337.3447848⟩
CODASPY
International audience; Packers are widespread tools used by malware authors to hinder static malware detection and analysis. Identifying the packer used to pack a malware is essential to properly unpack and analyze the malware, be it manually or aut
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::b8b210301c5cf30089cfeedeb38c997d
https://hal.inria.fr/hal-03149211
https://hal.inria.fr/hal-03149211