Circular Image

S. Picek

37 records found

Backdoor Attacks in Active Learning

An Extensive Analysis of Backdoor Injection in Active Learning-Trained Computer Vision Models

Deep learning sustained great success in several domains, particularly in computer vision, where it facilitates tasks such as image classification and object recognition. However, one significant challenge in deep learning is data labeling, due to the high cost and effort require ...
Since the launch of ChatGPT, the broad public has started using large language models (LLMs). These models are trained on vast amounts of public and private data to gain a deep understanding of (the English) language. Based on this understanding, the models predict a logical outp ...

Demystifying LLM Attacks And Defense

A Comprehensive Study with Improved Attack Technique

Large Language Models (LLMs) have emerged as pivotal in content generation, offering profound societal impacts. Previous research has highlighted their propensity to generate content that breaches societal norms. Misuse of LLMs poses significant ethical concerns, including misinf ...
Machine learning, a pivotal aspect of artificial intelligence, has dramatically altered our interaction with technology and our handling of extensive data. Through its ability to learn and make decisions from patterns and previous experiences, machine learning is growing in influ ...
In an era of increasing reliance on digital technology, securing embedded and interconnected devices, such as smart cards or Internet of Things (IoT) devices, against emerging threats becomes crucial, highlighting the need for advanced security measures. Cryptographic algorithms, ...
Side-channel attacks (SCA) play a crucial role in assessing the security of the implementation of cryp- tographic algorithms. Still, traditional profiled attacks require a nearly identical reference device to the target, limiting their practicality. This thesis focuses on non-pro ...

GGANet

Algorithm Unrolling for Water Distribution Networks Metamodelling

Water distribution networks (WDNs) provide drinking water to urban and rural consumers through a network of pipes that transport water from reservoirs to junctions. Water utilities rely on tools such as EPANET to simulate and analyse the performance of water distribution networks ...
Maximum Satisfiability (MaxSAT) is a known problem within the optimization field which has led many different solving approaches to be devised in the last several decades. From Linear Search to unsatisfiable core-based solvers, many MaxSAT algorithms rely on cardinality constrain ...

Methodologies for deep learning SCA

An analysis on the design and construction of convolutional neural networks for side-channel datasets

Side-channel attacks leverage the unintentional leakage of information that indirectly relates to cryptographic secrets such as encryption keys. Previous settings would involve an attacker conducting some manual-statistical analysis to exploit this data and retrieve sensitive inf ...

Hardware-based implementations in Side-Channel Analysis

A comparison study of DL SCA attacks against HW and SW AES and a novel methodology

Side-Channel Attacks (SCA) attempt to recover the secret cryptographic key from an electronic device by exploiting the unintended physical leakages of said device. With the devices that are being attacked becoming more sophisticated, so is SCA. In the past few years, the focus of ...
Some of the most prominent types of attacks against modern cryptographic implementations are side-channel attacks. These attacks leverage some unintended, often physical, leakage of the implementation to retrieve secret information. In recent times, a large part of the focus of s ...
Side-channel attacks (SCA) can obtain secret information related to the private key used during encryption executed on some device by exploiting leakage in power traces produced by the device. In recent years, researchers found that a neural network (NN) can be employed to execut ...
In this work, we explore the topic of Machine Learning (ML) in the area of Leakage Assessment (LA), a subsection of the field of Side-Channel Analysis (SCA). We focus on Deep Learning Leakage Assessment (DL-LA), as proposed by Wegener et al., and its relation to the established T ...

Side-channel Attacks on Inner Rounds of AES and PRESENT

A deeper look into the inner rounds of SPN based block ciphers and how this vision can help us attack the intermediate bytes using Deep Learning

Side-channel attacks (SCA) focus on vulnerabilities caused by insecure implementations and exploit them to deduce useful information about the data being processed or the data itself through leakages obtained from the device. There have been many studies exploiting these side-cha ...
Code-Based Cryptography is a branch of the Post-Quantum Cryptography research area. As such, its focus is on developing algorithms that can be used in the current communication systems to secure them against an adversary powered in the (near) future by a quantum computer. A cod ...

Loss functions for profiled side-channel analysis

An analysis of loss functions and the application of multi­-loss functions for deep learning in the SCA domain

Deep learning techniques have become the tool of choice for side-channel analysis. In recent years, neural networks like multi-layer perceptrons and convolutional neural networks have proven to be the most powerful instruments for performing side-channel analysis. Recent work on ...
Security misconfigurations and neglected updates commonly lead to systems being vulnerable. Ranging from default passwords to unpatched software, many systems, such as websites or databases, are being compromised due to these pitfalls. Often stemming from human error, it is diffi ...

Adversarial Examples as a defense against Side-Channel Attacks

A novel approach for countermeasure design

Over the last decades, side-channel attacks (SCAs) have been proven as a substantial weakness of cryptographic devices, while the recent growth of deep learning (DL) dramatically improved the performance of SCA. More and more researches present ways to build lightweight deep neur ...
To push the boundaries of technology, the world cup football for robots, RoboCup, is organized on a yearly basis since 1997. To push the boundaries of artificial intelligence, a simulated version of the RoboCup, AI World Cup Football, is arranged yearly from 2017. This requires s ...
The AI World Cup is a virtual competition in which teams of five players compete in a football match. The defensive strategies for the goalkeeper in this environment are yet to be researched, however. In previous editions of the competition the participating teams use a basic goa ...