Collection's Items (Sorted by Submit Date in Descending order): 1 to 20 of 80
| Issue Date | Title | Author(s) |
 | 2024 | Creating from noise: trace generations using diffusion model for side-channel attack | Yap, Trevor; Jap, Dirmanto |
 | 2023 | Deep-learning-based X-ray CT slice analysis for layout verification in printed circuit boards | Cheng, Deruo; Shi, Yiqiong; Tee, Yee Yang; Song, Jingsi; Wang, Xue; Wen, Bihan; Gwee, Bah Hwee |
 | 2023 | Security evaluation of microcontrollers: a case study in smart watches | Zeng, Xiaomei; Liu, Qing; Chua, Chung Tah; Chef, Samuel; Gan, Chee Lip |
 | 2023 | Hardware security assessment through repair of damaged device | Sim, Siang Yee; Liu, Qing; Kor, Katherine Hwee Boon; Gan, Chee Lip |
 | 2023 | Using model optimization as countermeasure against model recovery attacks | Jap, Dirmanto; Bhasin, Shivam |
 | 2022 | On (in)security of edge-based machine learning against electromagnetic side-channels | Bhasin, Shivam; Jap, Dirmanto; Picek, Stjepan |
 | 2021 | Are cold boot attacks still feasible : a case study on Raspberry Pi with stacked memory | Won, Yoo-Seung; Bhasin, Shvam |
 | 2021 | DeepFreeze : cold boot attacks and high fidelity model recovery on commercial EdgeML device | Won, Yoo-Seung; Chatterjee, Soham; Jap, Dirmanto; Basu, Arindam; Bhasin, Shivam |
| 2021 | WaC : first results on practical side-channel attacks on commercial machine learning accelerator | Won, Yoo-Seung; Chatterjee, Soham; Jap, Dirmanto; Basu, Arindam; Bhasin, Shivam |
 | 2020 | Mind the portability : a warriors guide through realistic profiled side-channel analysis | Bhasin, Shivam; Chattopadhyay, Anupam; Heuser, Annelie; Jap, Dirmanto; Picek, Stjepan; Shrivastwa, Ritu Ranjan |
 | 2021 | On use of deep learning for side channel evaluation of black box hardware AES engine | Won, Yoo-Seung; Bhasin, Shivam |
| 2020 | Practical side-channel based model extraction attack on tree-based machine learning algorithm | Jap, Dirmanto; Yli-Mäyry, Ville; Ito, Akira; Ueno, Rei; Bhasin, Shivam; Homma, Naofumi |
| 2019 | Poster : recovering the input of neural networks via single shot side-channel attacks | Batina, Lejla; Jap, Dirmanto; Bhasin, Shivam; Picek, Stjepan |
| 2020 | Practical side-channel based model extraction attack on tree-based machine learning algorithm | Jap, Dirmanto; Yli-Mäyry, Ville; Ito, Akira; Ueno, Rei; Bhasin, Shivam; Homma, Naofumi |
 | 2021 | A systematic side-channel evaluation of black box AES in secure MCU : architecture recovery and retrieval of PUF based secret key | Won, Yoo-Seung; Bhasin, Shivam |
 | 2020 | Use of common parts in masking filters for complexity reduction in FRM-based FIR filters | Saramäki, Tapio; Liu, Qinglai; Lim, Yong Ching |
| 2020 | Practical reverse engineering of secret Sboxes by side-channel analysis | Jap, Dirmanto; Bhasin, Shivam |
| 2020 | Push for more : on comparison of data augmentation and SMOTE with optimised deep learning architecture for side-channel | Won, Yoo-Seung; Jap, Dirmanto; Bhasin, Shivam |
 | 2021 | Time to leak : cross-device timing attack on edge deep learning accelerator | Won, Yoo-Seung; Chatterjee, Soham; Jap, Dirmanto; Bhasin, Shivam; Basu, Arindam |
 | 2020 | Practical cold boot attack on IoT device - Case study on Raspberry Pi - | Won, Yoo-Seung; Park, Jong-Yeon; Han, Dong-Guk; Bhasin, Shivam |
Collection's Items (Sorted by Submit Date in Descending order): 1 to 20 of 80