bibliography.bib

@article{wpc2015,
  author = {Breier, Jakub and Brani\v{s}ov\'{a}, Jana},
  title = {A Dynamic Rule Creation Based Anomaly Detection Method for Identifying Security Breaches in Log Records},
  journal = {Wireless Personal Communications, Springer},
  year = {2015},
  volume = {},
  number = {},
  pages = {1-15},
  issn = {1572-834X}
}
@article{jeeec2012,
  year = {2012},
  author = {Breier, Jakub and Kleja, Marcel},
  title = {On Practical Results of the Differential Power Analysis},
  journal = {Journal of Electrical Engineering},
  volume = {63},
  number = {2},
  pages = {125-129},
  issn = {1335-3632}
}
@article{ita2013,
  year = {2012},
  author = {Breier, Jakub and Hudec, Ladislav},
  title = {Security Mechanisms Role in Information Security Evaluation},
  journal = {Information Technology Applications},
  volume = {1},
  number = {2},
  pages = {5-15},
  issn = {1338-6468}
}
@article{jisis2014,
  year = {2014},
  author = {Breier, Jakub},
  title = {Asset Valuation Method for Dependent Entities},
  journal = {Journal of Internet Services and Information Security},
  volume = {4},
  number = {3},
  pages = {72-81},
  issn = {2182-2077}
}
@inproceedings{isqed2017, 
 author={Breier, Jakub and He, Wei and Bhasin, Shivam}, 
 booktitle={Proceedings of the 18th International Symposium on Quality Electronic Design (ISQED 2017)}, 
 title={An Electromagnetic Fault Injection Sensor using Hogge Phase-Detector}, 
 location={Santa Clara, CA, USA},
 year={2017}, 
 month={March}, 
 publisher={IEEE},
 pages={307-312}, 
}
@inproceedings{ct-rsa2017,
  author = {Breier, Jakub and Hou, Xiaolu},
  title = {Feeding Two Cats with One Bowl: On Designing a Fault and Side-Channel Resistant Software Encoding Scheme (In review process)},
  booktitle = {RSA Conference Cryptographers’ Track (CT-RSA 2017)},
  year = {2017},
  month = {Feb},
  location = {San Francisco, CA, USA},
  pages = {1-18}
}
@inproceedings{asp-dac2017,
  author = {He, Wei and Breier, Jakub and Bhasin, Shivam},
  title = {An Electromagnetic Fault Injection Sensor using Hogge Phase-Detector (To appear)},
  booktitle = {Proceedings of the 22nd Asia and South Pacific Design Automation Conference (ASP-DAC 2017)},
  year = {2017},
  month = {Jan},
  location = {Tokio, Japan},
  pages = {1-2}
}
@inproceedings{space2016,
  author = {He, Wei and Breier, Jakub and Bhasin, Shivam and Jap, Dirmanto and Ong, Hock Guan and Gan, Chee Lip},
  title = {Comprehensive Laser Sensitivity Profiling and Data Register Bit-Flips in 65 nm FPGA (To appear)},
  booktitle = {International Conference on Security, Privacy and Applied Cryptographic Engineering (SPACE'16)},
  year = {2016},
  month = {Dec},
  location = {Hyderabad, India},
  pages = {1-20}
}
@inproceedings{space2016_2,
  author = {He, Wei and Breier, Jakub and Bhasin, Shivam},
  title = {Cheap and Cheerful: A Low-Cost Digital Sensor for Detecting Laser Fault Injection Attacks (To appear)},
  booktitle = {International Conference on Security, Privacy and Applied Cryptographic Engineering (SPACE'16)},
  year = {2016},
  month = {Dec},
  location = {Hyderabad, India},
  pages = {1-20}
}
@inproceedings{fdtc2016,
  author = {He, Wei and Breier, Jakub and Bhasin, Shivam and Miura, Noriyuki and Nagata, Makoto},
  booktitle = {Fault Diagnosis and Tolerance in Cryptography (FDTC)},
  title = {Ring Oscillator under Laser: Potential of PLL based Countermeasure against Laser Fault Injection (To appear)},
  location = {Santa Barbara, CA, USA},
  year = {2016},
  month = {Aug},
  publisher = {IEEE},
  pages = {1-12}
}
@inproceedings{ares2016,
  author = {Breier, Jakub},
  booktitle = {Availability, Reliability and Security (ARES), 2016 Eleventh International Conference on},
  title = {On Analyzing Program Behavior Under Fault Injection Attacks (To appear)},
  location = {Salzburg, Austria},
  year = {2016},
  month = {Aug},
  publisher = {IEEE},
  pages = {1-5}
}
@inproceedings{isic_2016,
  author = {Breier, Jakub and Chen, Chien-Ning},
  booktitle = {Proceedings of The 15th International Symposium on Integrated Circuits (ISIC)},
  title = {On Determining Optimal Parameters for Testing Devices Against Laser Fault Attacks (To appear)},
  location = {Singapore},
  year = {2016},
  month = {Dec},
  publisher = {IEEE},
  pages = {1-4}
}
@inproceedings{cpss2016,
  author = {He, Wei and Breier, Jakub and Bhasin, Shivam and Chattopadhyay, Anupam},
  title = {Bypassing Parity Protected Cryptography Using Laser Fault Injection in Cyber-Physical System},
  booktitle = {Proceedings of the 2nd ACM International Workshop on Cyber-Physical System Security},
  series = {CPSS '16},
  year = {2016},
  isbn = {978-1-4503-4288-9},
  location = {Xi'an, China},
  pages = {15--21},
  numpages = {7},
  url = {http://doi.acm.org/10.1145/2899015.2899019},
  doi = {10.1145/2899015.2899019},
  acmid = {2899019},
  publisher = {ACM},
  address = {New York, NY, USA},
  keywords = {FPGA, concurrent error detection (CED), cyber-physical system, laser fault injection, parity, register bit-flip},
  month = {May}
}
@inproceedings{breier_jap_bhasin_host2016,
  author = {J. Breier and D. Jap and S. Bhasin},
  booktitle = {2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)},
  title = {The Other Side of The Coin: Analyzing Software Encoding Schemes Against Fault Injection Attacks},
  year = {2016},
  pages = {209-216},
  location = {McLean, VA, USA},
  keywords = {Circuit faults;Encoding;Internet of things;Logic gates;Resistance;Security;Software},
  doi = {10.1109/HST.2016.7495584},
  month = {May}
}
@inproceedings{breier_he_siot2015,
  year = {2015},
  month = {Sep},
  booktitle = {Proceedings of the 2015 Workshop on Secure Internet of Things (SIoT)},
  series = {Conference Publishing Services},
  editor = {Linawati and Mahendra, MadeSudiana and Neuhold, ErichJ. and Tjoa, AMin and You, Ilsun},
  title = {Multiple Fault Attack on PRESENT with a Hardware Trojan Implementation in FPGA},
  publisher = {IEEE},
  author = {Breier, Jakub and He, Wei},
  location = {Vienna, Austria},
  pages = {58-64},
  language = {English}
}
@inproceedings{breier_jap_asiaares2015,
  year = {2015},
  month = {Oct},
  booktitle = {Information and Communication Technology: Third IFIP TC 5/8 International Conference, ICT-EurAsia 2015, and 9th IFIP WG 8.9 Working Conference, CONFENIS 2015, Held as Part of WCC 2015},
  series = {Lecture Notes in Computer Science},
  editor = {Linawati and Mahendra, MadeSudiana and Neuhold, ErichJ. and Tjoa, AMin and You, Ilsun},
  title = {Differential Fault Attack on LEA},
  publisher = {Springer Berlin Heidelberg},
  author = {Jap, Dirmanto and Breier, Jakub},
  location = {Daejeon, Korea},
  pages = {265--274},
  language = {English}
}
@inproceedings{wess2015,
  author = {Breier, Jakub and Jap, Dirmanto},
  title = {Testing Feasibility of Back-Side Laser Fault Injection on a Microcontroller},
  booktitle = {Proceedings of the WESS'15: Workshop on Embedded Systems Security},
  series = {WESS'15},
  year = {2015},
  isbn = {978-1-4503-3667-3},
  location = {Amsterdam, Netherlands},
  pages = {5:1--5:6},
  articleno = {5},
  numpages = {6},
  url = {http://doi.acm.org/10.1145/2818362.2818367},
  doi = {10.1145/2818362.2818367},
  acmid = {2818367},
  publisher = {ACM},
  address = {New York, NY, USA},
  keywords = {ATmega328P, Fault Attack, Laser}
}
@inproceedings{cpss2015,
  author = {Breier, Jakub and Jap, Dirmanto and Chen, Chien-Ning},
  booktitle = {First Cyber-Physical System Security Workshop (CPSS 2015)},
  title = {Laser Profiling for the Back-Side Fault Attacks (With a Practical Laser Clock Glitch Attack on AES)},
  location = {Singapore},
  year = {2015},
  month = {Apr},
  publisher = {ACM},
  pages = {99-103}
}
@inproceedings{icisa2015,
  author = {Breier, Jakub and Brani\v{s}ov\'{a}, Jana},
  booktitle = {Information Science and Applications (ICISA), 2015 Sixth International Conference on},
  title = {Anomaly Detection from Log Files Using Data Mining Techniques},
  location = {Pattaya, Thailand},
  year = {2015},
  month = {Feb},
  publisher = {Springer},
  pages = {449-457}
}
@inproceedings{ares2014,
  author = {Breier, Jakub and Pomothy, Adam},
  booktitle = {Availability, Reliability and Security (ARES), 2014 Ninth International Conference on},
  title = {Qualified Electronic Signature via SIM Card Using JavaCard 3 Connected Edition
Platform},
  location = {Fribourg, Switzerland},
  year = {2014},
  month = {Sept},
  publisher = {IEEE},
  pages = {349-355},
  keywords = {database management systems;decision making;grey systems;security of data;TOPSIS decision making method;critical security controls;grey relational analysis;quantitative technique;secure information infrastructure;security control databases;security control prioritization;security control selection;security managers;Cost accounting;Decision making;Organizations;Risk analysis;Security;Standards organizations;TOPSIS;grey relational analysis;information security;risk analysis;security controls},
  doi = {10.1109/ARES.2014.53}
}
@inproceedings{isic2014_1,
  author = {Breier, Jakub and Jap, Dirmanto},
  booktitle = {Proceedings of The 14th International Symposium on Integrated Circuits (ISIC)},
  title = {A Survey of the State-of-the-Art Fault Attacks},
  location = {Singapore},
  publisher = {IEEE},
  year = {2014},
  month = {Dec},
  pages = {152-155}
}
@inproceedings{isic2014_2,
  author = {Jap, Dirmanto and Breier, Jakub},
  booktitle = {Proceedings of The 14th International Symposium on Integrated Circuits (ISIC)},
  title = {Comparison of Machine-Learning Based Side-Channel Analysis Methods},
  location = {Singapore},
  publisher = {IEEE},
  year = {2014},
  month = {Dec},
  pages = {38-41}
}
@inproceedings{breier_asiaares2014,
  year = {2014},
  isbn = {978-3-642-55031-7},
  booktitle = {Proceedings of the 2014 International Conference on Information and Communication Technology},
  volume = {8407},
  series = {Lecture Notes in Computer Science},
  editor = {Linawati and Mahendra, MadeSudiana and Neuhold, ErichJ. and Tjoa, AMin and You, Ilsun},
  doi = {10.1007/978-3-642-55032-4_40},
  title = {Assets Dependencies Model in Information Security Risk Management},
  url = {http://dx.doi.org/10.1007/978-3-642-55032-4_40},
  publisher = {Springer Berlin Heidelberg},
  keywords = {Information Security Risk Management; Asset Valuation; Asset Dependency; Risk Analysis},
  author = {Breier, Jakub and Schindler, Frank},
  location = {Bali, Indonesia},
  pages = {405-412},
  language = {English}
}
@inproceedings{estel2012,
  author = {Breier, Jakub and Hudec, Ladislav},
  booktitle = {Satellite Telecommunications (ESTEL), 2012 IEEE First AESS European Conference on},
  title = {New Approach in Information System Security Evaluation},
  location = {Rome, Italy},
  publisher = {IEEE},
  year = {2012},
  month = {Oct},
  pages = {1-6},
  keywords = {IEC standards;ISO standards;analytic hierarchy process;information systems;risk management;security of data;ISO/IEC 27002:2005 standard;analytic hierarchy process technique;confidentiality;information system security evaluation;information technology risk assessment;qualitative method;security control;security mechanism;Asset management;Availability;Information security;Standards;Vectors},
  doi = {10.1109/ESTEL.2012.6400145}
}
@inproceedings{ares2013,
  author = {Breier, Jakub and Hudec, Ladislav},
  booktitle = {Availability, Reliability and Security (ARES), 2013 Eighth International Conference on},
  title = {On Selecting Critical Security Controls},
  location = {Regensburg, Germany},
  publisher = {IEEE},
  year = {2013},
  month = {Sept},
  pages = {582-588},
  keywords = {database management systems;decision making;grey systems;security of data;TOPSIS decision making method;critical security controls;grey relational analysis;quantitative technique;secure information infrastructure;security control databases;security control prioritization;security control selection;security managers;Cost accounting;Decision making;Organizations;Risk analysis;Security;Standards organizations;TOPSIS;grey relational analysis;information security;risk analysis;security controls},
  doi = {10.1109/ARES.2013.77}
}
@inproceedings{compsystech2012,
  author = {Breier, Jakub and Hudec, Ladislav},
  title = {Towards a Security Evaluation Model Based on Security Metrics},
  booktitle = {Proceedings of the 13th International Conference on Computer Systems and Technologies},
  series = {CompSysTech '12},
  year = {2012},
  isbn = {978-1-4503-1193-9},
  location = {Ruse, Bulgaria \\ Best Paper Award},
  pages = {87--94},
  numpages = {8},
  url = {http://doi.acm.org/10.1145/2383276.2383291},
  doi = {10.1145/2383276.2383291},
  acmid = {2383291},
  publisher = {ACM},
  address = {New York, NY, USA},
  keywords = {formal concept analysis, information security, risk evaluation, security metrics, security model, security standards}
}
@inproceedings{asiaares2013,
  author = {Breier, Jakub and Hudec, Ladislav},
  title = {On Identifying Proper Security Mechanisms},
  booktitle = {Proceedings of the 2013 International Conference on Information and Communication Technology},
  series = {ICT-EurAsia'13},
  year = {2013},
  isbn = {978-3-642-36817-2},
  location = {Yogyakarta, Indonesia},
  pages = {285--294},
  numpages = {10},
  url = {http://dx.doi.org/10.1007/978-3-642-36818-9_29},
  doi = {10.1007/978-3-642-36818-9_29},
  acmid = {2456446},
  publisher = {Springer-Verlag},
  address = {Berlin, Heidelberg},
  keywords = {ISO/IEC 27002 standard, information security, risk evaluation, security mechanisms, security standards}
}
@inproceedings{compsystech2011,
  author = {Breier, Jakub and Hudec, Ladislav},
  title = {Risk Analysis Supported by Information Security Metrics},
  booktitle = {Proceedings of the 12th International Conference on Computer Systems and Technologies},
  series = {CompSysTech '11},
  year = {2011},
  isbn = {978-1-4503-0917-2},
  location = {Vienna, Austria},
  pages = {393--398},
  numpages = {6},
  url = {http://doi.acm.org/10.1145/2023607.2023673},
  doi = {10.1145/2023607.2023673},
  acmid = {2023673},
  publisher = {ACM},
  address = {New York, NY, USA},
  keywords = {computer security, risk analysis, security metrics, security model, security standards}
}
@inproceedings{iitsrc2012,
  author = {Breier, Jakub},
  title = {Information System Security Assessment Method Based on Security Mechanisms},
  booktitle = {Proceedings in Informatics and Information Technologies},
  series = {IIT.SRC '12},
  year = {2012},
  isbn = {978-80-227-2848-5},
  location = {Bratislava, Slovakia},
  pages = {141--150},
  numpages = {9},
  publisher = {STU},
  address = {Bratislava, Slovakia},
  keywords = {slovakia}
}
@inproceedings{iitsrc2008_1,
  author = {Breier, Jakub},
  title = {On Interaction among Aspect-oriented Change Realizations},
  booktitle = {Proceedings in Informatics and Information Technologies},
  series = {IIT.SRC '08},
  year = {2008},
  isbn = {978-80-227-2848-5},
  location = {Bratislava, Slovakia},
  pages = {102--109},
  numpages = {7},
  publisher = {STU},
  address = {Bratislava, Slovakia},
  keywords = {slovakia}
}
@inproceedings{iitsrc2008_2,
  author = {Kramar, Tomas and Breier, Jakub and Koine, Peter},
  title = {Project Heimdall: A Voice Control Framework},
  booktitle = {Proceedings in Informatics and Information Technologies},
  series = {IIT.SRC '08},
  year = {2008},
  isbn = {978-80-227-2848-5},
  location = {Bratislava, Slovakia},
  pages = {195--202},
  numpages = {7},
  publisher = {STU},
  address = {Bratislava, Slovakia},
  keywords = {slovakia}
}

This file was generated by bibtex2html 1.98.