Collection: research
(41 - 60 of 66)

Pages

document
Rijsdijk, J. (author), Wu, L. (author), Perin, G. (author), Picek, S. (author)
Deep learning represents a powerful set of techniques for profiling side-channel analysis. The results in the last few years show that neural network architectures like multilayer perceptron and convolutional neural networks give strong attack performance where it is possible to break targets protected with various coun-termeasures....
journal article 2021
document
Mariot, L. (author), Picek, S. (author), Jakobovic, Domagoj (author), Leporati, Alberto (author)
Reversible Cellular Automata (RCA) are a particular kind of shift-invariant transformations characterized by dynamics composed only of disjoint cycles. They have many applications in the simulation of physical systems, cryptography, and reversible computing. In this work, we formulate the search of a specific class of RCA – namely, those...
journal article 2021
document
Xu, J. (author), Xue, Minhui (author), Picek, S. (author)
Backdoor attacks represent a serious threat to neural network models. A backdoored model will misclassify the trigger-embedded inputs into an attacker-chosen target label while performing normally on other benign inputs. There are already numerous works on backdoor attacks on neural networks, but only a few works consider graph neural...
conference paper 2021
document
Jakobovic, Domagoj (author), Picek, S. (author), Martins, Marcella S.R. (author), Wagner, Markus (author)
Boolean functions have numerous applications in domains as diverse as coding theory, cryptography, and telecommunications. Heuristics play an important role in the construction of Boolean functions with the desired properties for a specific purpose. However, there are only sparse results trying to understand the problem's difficulty. With...
journal article 2021
document
Yildiz, B. (author), Hung, H.S. (author), Krijthe, J.H. (author), Liem, C.C.S. (author), Loog, M. (author), Migut, M.A. (author), Oliehoek, F.A. (author), Panichella, A. (author), Pawełczak, Przemysław (author), Picek, S. (author), de Weerdt, M.M. (author), van Gemert, J.C. (author)
We present ReproducedPapers.org : an open online repository for teaching and structuring machine learning reproducibility. We evaluate doing a reproduction project among students and the added value of an online reproduction repository among AI researchers. We use anonymous self-assessment surveys and obtained 144 responses. Results suggest...
conference paper 2021
document
Heuser, Annelie (author), Picek, S. (author), Guilley, Sylvain (author), Mentens, Nele (author)
Side-channel attacks represent a powerful category of attacks against cryptographic devices. Still, side-channel analysis for lightweight ciphers is much less investigated than for instance for AES. Although intuition may lead to the conclusion that lightweight ciphers are weaker in terms of side-channel resistance, that remains to be...
journal article 2020
document
Perin, G. (author), Chmielewski, Łukasz (author), Picek, S. (author)
The adoption of deep neural networks for profiled side-channel attacks provides powerful options for leakage detection and key retrieval of secure products. When training a neural network for side-channel analysis, it is expected that the trained model can implement an approximation function that can detect leaking side-channel samples and, at...
journal article 2020
document
Wu, L. (author), Picek, S. (author)
In the profiled side-channel analysis, deep learning-based techniques proved to be very successful even when attacking targets protected with countermeasures. Still, there is no guarantee that deep learning attacks will always succeed. Various countermeasures make attacks significantly more complex, and such countermeasures can be further...
journal article 2020
document
Weissbart, L.J.A. (author), Chmielewski, Łukasz (author), Picek, S. (author), Batina, Lejla (author)
Profiling attacks, especially those based on machine learning, proved to be very successful techniques in recent years when considering the side-channel analysis of symmetric-key crypto implementations. At the same time, the results for implementations of asymmetric-key cryptosystems are very sparse. This paper considers several machine learning...
journal article 2020
document
Wu, L. (author), Ribera, Gerard (author), Beringuier-Boher, Noemie (author), Picek, S. (author)
Semi-invasive fault injection attacks are powerful techniques well-known by attackers and secure embedded system designers. When performing such attacks, the selection of the fault injection parameters is of utmost importance and usually based on the experience of the attacker. Surprisingly, there exists no formal and general approach to...
conference paper 2020
document
Mariot, L. (author), Picek, S. (author), Jakobovic, Domagoj (author), Leporati, Alberto (author)
We consider the problem of evolving a particular kind of shift-invariant transformation – namely, Reversible Cellular Automata (RCA) defined by conserved landscape rules – using GA and GP. To this end, we employ three different optimization strategies: a single-objective approach carried out with GA and GP where only the reversibility...
conference paper 2020
document
Picek, S. (author), Jakobovic, Domagoj (author)
conference paper 2020
document
Manzoni, Luca (author), Jakobovic, Domagoj (author), Mariot, L. (author), Picek, S. (author), Castelli, Mauro (author)
Tasks related to Natural Language Processing (NLP) have recently been the focus of a large research endeavor by the machine learning community. The increased interest in this area is mainly due to the success of deep learning methods. Genetic Programming (GP), however, was not under the spotlight with respect to NLP tasks. Here, we propose a...
conference paper 2020
document
Djurasevic, Marko (author), Jakobovic, Domagoj (author), Picek, S. (author)
Substitution boxes (S-boxes) are nonlinear mappings that represent one of the core parts of many cryptographic algorithms (ciphers). If S-box does not possess good properties, a cipher would be susceptible to attacks. To design suitable S-boxes, we can use heuristics as it allows significant freedom in the selection of required cryptographic...
conference paper 2020
document
Christensen, Thomas (author), Loh, Charlotte (author), Picek, S. (author), Jakobović, Domagoj (author), Jing, Li (author), Fisher, Sophie (author), Ceperic, Vladimir (author), Joannopoulos, John D. (author), Soljačić, Marin (author)
The prediction and design of photonic features have traditionally been guided by theory-driven computational methods, spanning a wide range of direct solvers and optimization techniques. Motivated by enormous advances in the field of machine learning, there has recently been a growing interest in developing complementary data-driven methods...
journal article 2020
document
Perin, G. (author), Chmielewski, Łukasz (author), Batina, Lejla (author), Picek, S. (author)
To mitigate side-channel attacks, real-world implementations of public-key cryptosystems adopt state-of-the-art countermeasures based on randomization of the private or ephemeral keys. Usually, for each private key operation, a “scalar blinding” is performed using 32 or 64 randomly generated bits. Nevertheless, horizontal attacks based on a...
journal article 2020
document
Knezevic, Karlo (author), Picek, S. (author), Jakobovic, Domagoj (author), Hernandez-Castro, Julio (author)
Finding optimal adversarial dynamics between defenders and attackers in large network systems is a complex problem one can approach from several perspectives. The results obtained are often not satisfactory since they either concentrate on only one party or run very simplified scenarios that are hard to correlate with realistic settings. To...
conference paper 2020
document
Carlet, Claude (author), Djurasevic, Marko (author), Jakobovic, Domagoj (author), Picek, S. (author)
We investigate whether it is possible to evolve cryptographically strong S-boxes that have additional constraints on their structure. We investigate two scenarios: where S-boxes additionally have a specific sum of values in rows, columns, or diagonals and the scenario where we check that the difference between the Hamming weights of inputs...
conference paper 2020
document
Ðurasević, M. (author), Jakobovic, Domagoj (author), Martins, Marcella Scoczynski Ribeiro (author), Picek, S. (author), Wagner, Markus (author)
Genetic programming is an often-used technique for symbolic regression: finding symbolic expressions that match data from an unknown function. To make the symbolic regression more efficient, one can also use dimensionally-aware genetic programming that constrains the physical units of the equation. Nevertheless, there is no formal analysis of...
conference paper 2020
document
Mariot, Luca (author), Picek, S. (author), Leporati, Alberto (author), Jakobovic, Domagoj (author)
Cellular Automata (CA) represent an interesting approach to design Substitution<br/>Boxes (S-boxes) having good cryptographic properties and low implementation costs. From the cryptographic perspective, up to now there have been only ad-hoc studies about specific kinds of CA, the best known example being the χ nonlinear transformation used in...
journal article 2019
Collection: research
(41 - 60 of 66)

Pages