publications

publications in a reversed chronological order

2024

  1. TVLSI
    Another Look at Side-Channel-Resistant Encoding Schemes
    Xiaolu Hou, Jakub Breier, and Mladen Kovačević
    IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 2024
  2. Textbook
    Cryptography and Embedded Systems Security
    Xiaolu Hou, and Jakub Breier
    2024

2023

  1. TDSC
    FooBaR: Fault Fooling Backdoor Attack on Neural Network Training
    Jakub Breier, Xiaolu Hou, Martı́n Ochoa, and Jesus Solano
    IEEE Transactions on Dependable and Secure Computing, 2023
  2. CS
    A survey on fault attacks on symmetric key cryptosystems
    Anubhab Baksi, Shivam Bhasin, Jakub Breier, Dirmanto Jap, and Dhiman Saha
    ACM Computing Surveys, 2023
  3. CaC
    Quantum implementation and analysis of default
    Kyungbae Jang, Anubhab Baksi, Jakub Breier, Hwajeong Seo, and Anupam Chattopadhyay
    Cryptography and Communications, 2023
  4. Access
    New Results on Machine Learning-Based Distinguishers
    Anubhab Baksi, Jakub Breier, Vishnu Asutosh Dasu, Xiaolu Hou, Hyunji Kim, and Hwajeong Seo
    IEEE Access, 2023
  5. CSCML
    A Desynchronization-Based Countermeasure Against Side-Channel Analysis of Neural Networks
    Jakub Breier, Dirmanto Jap, Xiaolu Hou, and Shivam Bhasin
    In International Symposium on Cyber Security, Cryptology, and Machine Learning, 2023

2022

  1. TR
    SNIFF: reverse engineering of neural networks with fault attacks
    Jakub Breier, Dirmanto Jap, Xiaolu Hou, Shivam Bhasin, and Yang Liu
    IEEE Transactions on Reliability, 2022
  2. TCHES
    A finer-grain analysis of the leakage (non) resilience of OCB
    Francesco Berti, Shivam Bhasin, Jakub Breier, Xiaolu Hou, Romain Poussier, François-Xavier Standaert, and Balasz Udvarhelyi
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2022
  3. TCHES
    Side channel attack on stream ciphers: A three-step approach to state/key recovery
    Satyam Kumar, Vishnu Asutosh Dasu, Anubhab Baksi, Santanu Sarkar, Dirmanto Jap, Jakub Breier, and Shivam Bhasin
    IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022
  4. Access
    How practical are fault injection attacks, really?
    Jakub Breier, and Xiaolu Hou
    IEEE Access, 2022
  5. Book Chapter
    On implementation-level security of edge-based machine learning models
    Lejla Batina, Shivam Bhasin, Jakub Breier, Xiaolu Hou, and Dirmanto Jap
    In Security and Artificial Intelligence: A Crossdisciplinary Approach, 2022
  6. SPACE
    Big brother is watching you: a closer look at backdoor construction
    Anubhab Baksi, Arghya Bhattacharjee, Jakub Breier, Takanori Isobe, and Mridul Nandi
    In International Conference on Security, Privacy, and Applied Cryptography Engineering, 2022
  7. TIFS
    SBCMA: Semi-Blind Combined Middle-Round Attack on Bit-Permutation Ciphers With Application to AEAD Schemes
    Xiaolu Hou, Jakub Breier, and Shivam Bhasin
    IEEE Transactions on Information Forensics and Security, 2022

2021

  1. TDSC
    On Evaluating Fault Resilient Encoding Schemes in Software
    Jakub Breier, Xiaolu Hou, and Yang Liu
    IEEE Transactions on Dependable and Secure Computing, 2021
  2. DATE
    Machine Learning-Assisted Differential Distinguishers for Lightweight Ciphers
    Anubhab Baksi, Jakub Breier, Yi Chen, and Xiaoyang Dong
    In Design, Automation & Test in Europe Conference & Exhibition (DATE), 2021
  3. TIFS
    Back to the basics: Seamless integration of side-channel pre-processing in deep neural networks
    Yoo-Seung Won, Xiaolu Hou, Dirmanto Jap, Jakub Breier, and Shivam Bhasin
    IEEE Transactions on Information Forensics and Security, 2021
  4. SILC
    Following-up on machine learning assisted differential distinguishers
    Anubhab Baksi, Jakub Breier, Vishnu Asutosh Dasu, Xiaoyang Dong, and Chen Yi
    In SILC Workshop-Security and Implementation of Lightweight Cryptography, 2021
  5. DATE
    DNFA: Differential no-fault analysis of bit permutation based ciphers assisted by side-channel
    Xiaolu Hou, Jakub Breier, and Shivam Bhasin
    In 2021 Design, Automation & Test in Europe Conference & Exhibition (DATE), 2021
  6. DATE
    Feeding three birds with one scone: A generic duplication based countermeasure to fault attacks
    Anubhab Baksi, Shivam Bhasin, Jakub Breier, Anupam Chattopadhyay, and Vinay BY Kumar
    In 2021 Design, Automation & Test in Europe Conference & Exhibition (DATE), 2021
  7. MR
    Physical security of deep learning on edge devices: Comprehensive evaluation of fault injection attack vectors
    Xiaolu Hou, Jakub Breier, Dirmanto Jap, Lei Ma, Shivam Bhasin, and Yang Liu
    Microelectronics Reliability, 2021
  8. AsiaCrypt
    DEFAULT: Cipher-Level Resistance Against Differential Fault Attack
    Anubhab Baksi, Shivam Bhasin, Jakub Breier, Mustafa Khairallah, Thomas Peyrin, Sumanta Sarkar, and Siang Meng Sim
    In Advances in Cryptology – ASIACRYPT 2021, 2021
  9. SILC
    Machine learning attacks on SPECK
    Anubhab Baksi, Jakub Breier, Vishnu Asutosh Dasu, and Xiaolu Hou
    Security and Implementation of Lightweight Cryptography (SILC), 2021

2020

  1. TCAS2
    A Countermeasure Against Statistical Ineffective Fault Analysis
    Jakub Breier, Mustafa Khairallah, Xiaolu Hou, and Yang Liu
    IEEE Transactions on Circuits and Systems II: Express Briefs, 2020
  2. TIFS
    On side channel vulnerabilities of bit permutations in cryptographic algorithms
    Jakub Breier, Dirmanto Jap, Xiaolu Hou, and Shivam Bhasin
    IEEE Transactions on Information Forensics and Security, 2020
  3. TCHES
    SITM: See-in-the-middle side-channel assisted middle round differential cryptanalysis on SPN block ciphers
    Shivam Bhasin, Jakub Breier, Xiaolu Hou, Dirmanto Jap, Romain Poussier, and Siang Meng Sim
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2020
  4. JETC
    Neural Network-based Inherently Fault-tolerant Hardware Cryptographic Primitives without Explicit Redundancy Checks
    Manaar Alam, Arnab Bag, Debapriya Basu Roy, Dirmanto Jap, Jakub Breier, Shivam Bhasin, and Debdeep Mukhopadhyay
    ACM Journal on Emerging Technologies in Computing Systems (JETC), 2020
  5. IPFA
    Security evaluation of deep neural network resistance against laser fault injection
    Xiaolu Hou, Jakub Breier, Dirmanto Jap, Lei Ma, Shivam Bhasin, and Yang Liu
    In 2020 IEEE International Symposium on the Physical and Failure Analysis of Integrated Circuits (IPFA), 2020
  6. Risk Management Framework for Machine Learning Security
    Jakub Breier, Adrian Baldwin, Helen Balinsky, and Yang Liu
    arXiv preprint arXiv:2012.04884, 2020

2019

  1. Book Chapter
    Differential fault attack resistant hardware design automation
    Mustafa Khairallah, Jakub Breier, Shivam Bhasin, and Anupam Chattopadhyay
    Automated Methods in Cryptographic Fault Analysis, 2019
  2. Book Chapter
    Differential Fault Analysis Automation on Assembly Code
    Jakub Breier, Xiaolu Hou, and Yang Liu
    Automated Methods in Cryptographic Fault Analysis, 2019
  3. Edited Book
    Automated Methods in Cryptographic Fault Analysis
    Jakub Breier, Xiaolu Hou, and Shivam Bhasin
    2019
  4. AsiaCCS
    SoK: on DFA vulnerabilities of substitution-permutation networks
    Mustafa Khairallah, Xiaolu Hou, Zakaria Najm, Jakub Breier, Shivam Bhasin, and Thomas Peyrin
    In Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
  5. TC
    SCADFA: Combined SCA+ DFA attacks on block ciphers with practical validations
    Sikhar Patranabis, Nilanjan Datta, Dirmanto Jap, Jakub Breier, Shivam Bhasin, and Debdeep Mukhopadhyay
    IEEE Transactions on Computers, 2019
  6. TCHES
    Fully Automated Differential Fault Analysis on Software Implementations of Block Ciphers
    Xiaolu Hou, Jakub Breier, Fuyuan Zhang, and Yang Liu
    IACR Transactions Cryptographic Hardware and Embedded Systems, 2019

2018

  1. TCHES
    Fault Attacks Made Easy: Differential Fault Analysis Automation on Assembly Code
    Jakub Breier, Xiaolu Hou, and Yang Liu
    IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018
  2. DATE
    SCADPA: Side-channel assisted differential-plaintext attack on bit permutation based ciphers
    Jakub Breier, Dirmanto Jap, and Shivam Bhasin
    In 2018 Design, Automation & Test in Europe Conference & Exhibition (DATE), 2018
  3. DATE
    DFARPA: Differential fault attack resistant physical design automation
    Mustafa Khairallah, Rajat Sadhukhan, Radhamanjari Samanta, Jakub Breier, Shivam Bhasin, Rajat Subhra Chakraborty, Anupam Chattopadhyay, and Debdeep Mukhopadhyay
    In 2018 Design, Automation & Test in Europe Conference & Exhibition (DATE), 2018
  4. HOST
    Protecting block ciphers against differential fault attacks without re-keying
    Anubhab Baksi, Shivam Bhasin, Jakub Breier, Mustafa Khairallah, and Thomas Peyrin
    In 2018 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), 2018
  5. Book Chapter
    Reactive Design Strategies Against Fault Injection Attacks
    Jakub Breier, Wei He, and Shivam Bhasin
    Fault Tolerant Architectures for Cryptography and Hardware Security, 2018
  6. Book Chapter
    Side-Channel Assisted Fault Analysis
    Sikhar Patranabis, Jakub Breier, Debdeep Mukhopadhyay, and Shivam Bhasin
    Fault Tolerant Architectures for Cryptography and Hardware Security, 2018
  7. Book Chapter
    Laser-based fault injection on microcontrollers
    Jakub Breier, Dirmanto Jap, and Chien-Ning Chen
    Fault Tolerant Architectures for Cryptography and Hardware Security, 2018
  8. ISVLSI
    Ppap and ippap: Pll-based protection against physical attacks
    Prasanna Ravi, Shivam Bhasin, Jakub Breier, and Anupam Chattopadhyay
    In 2018 IEEE Computer Society Annual Symposium on VLSI (ISVLSI), 2018
  9. CCS
    Practical fault attack on deep neural networks
    Jakub Breier, Xiaolu Hou, Dirmanto Jap, Lei Ma, Shivam Bhasin, and Yang Liu
    In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
  10. FDTC
    Breaking redundancy-based countermeasures with random faults and power side channel
    Sayandeep Saha, Dirmanto Jap, Jakub Breier, Shivam Bhasin, Debdeep Mukhopadhyay, and Pallab Dasgupta
    In 2018 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), 2018
  11. IPFA
    Descrambling of embedded SRAM using a laser probe
    Samuel Chef, Chung Tah Chua, Jing Yun Tay, Yu Wen Siah, Shivam Bhasin, J Breier, and Chee Lip Gan
    In 2018 IEEE International Symposium on the Physical and Failure Analysis of Integrated Circuits (IPFA), 2018

2017

  1. WPC
    A dynamic rule creation based anomaly detection method for identifying security breaches in log records
    Jakub Breier, and Jana Branišová
    Wireless Personal Communications, 2017
  2. FDTC
    A practical fault attack on ARX-like ciphers with a case study on ChaCha20
    SV Dilip Kumar, Sikhar Patranabis, Jakub Breier, Debdeep Mukhopadhyay, Shivam Bhasin, Anupam Chattopadhyay, and Anubhab Baksi
    In 2017 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), 2017
  3. ASP-DAC
    An FPGA-compatible PLL-based sensor against fault injection attack
    Wei He, Jakub Breier, Shivam Bhasin, Noriyuki Miura, and Makoto Nagata
    In 2017 22nd Asia and South Pacific Design Automation Conference (ASP-DAC), 2017
  4. ISQED
    An electromagnetic fault injection sensor using Hogge phase-detector
    Jakub Breier, Shivam Bhasin, and Wei He
    In 2017 18th International Symposium on Quality Electronic Design (ISQED), 2017
  5. JCEN
    A study on analyzing side-channel resistant encoding schemes with respect to fault attacks
    Jakub Breier, Dirmanto Jap, and Shivam Bhasin
    Journal of Cryptographic Engineering, 2017
  6. CT-RSA
    Feeding two cats with one bowl: On designing a fault and side-channel resistant software encoding scheme
    Jakub Breier, and Xiaolu Hou
    In Topics in Cryptology–CT-RSA 2017: The Cryptographers’ Track at the RSA Conference 2017, San Francisco, CA, USA, February 14–17, 2017, Proceedings, 2017
  7. FDTC
    One plus one is more than two: a practical combination of power and fault analysis attacks on PRESENT and PRESENT-like block ciphers
    Sikhar Patranabis, Jakub Breier, Debdeep Mukhopadhyay, and Shivam Bhasin
    In 2017 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), 2017
  8. HASS
    Extensive laser fault injection profiling of 65 nm FPGA
    Jakub Breier, Wei He, Shivam Bhasin, Dirmanto Jap, Samuel Chef, Hock Guan Ong, and Chee Lip Gan
    Journal of Hardware and Systems Security, 2017
  9. HASS
    Attacks in reality: The limits of concurrent error detection codes against laser fault injection
    Jakub Breier, Wei He, Dirmanto Jap, Shivam Bhasin, and Anupam Chattopadhyay
    Journal of Hardware and Systems Security, 2017

2016

  1. HOST
    The other side of the coin: Analyzing software encoding schemes against fault injection attacks
    Jakub Breier, Dirmanto Jap, and Shivam Bhasin
    In 2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), 2016
  2. FDTC
    Ring oscillator under laser: potential of pll-based countermeasure against laser fault injection
    Wei He, Jakub Breier, Shivam Bhasin, Noriyuki Miura, and Makoto Nagata
    In 2016 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), 2016
  3. CPSS
    Bypassing parity protected cryptography using laser fault injection in cyber-physical system
    Wei He, Jakub Breier, Shivam Bhasin, and Anupam Chattopadhyay
    In Proceedings of the 2nd ACM International Workshop on Cyber-Physical System Security, 2016
  4. ARES
    On analyzing program behavior under fault injection attacks
    Jakub Breier
    In 2016 11th International Conference on Availability, Reliability and Security (ARES), 2016
  5. ISIC
    On determining optimal parameters for testing devices against laser fault attacks
    Jakub Breier, and Chien-Ning Chen
    In 2016 International Symposium on Integrated Circuits (ISIC), 2016
  6. PROOFS
    Mistakes Are Proof That You Are Trying: On Verifying Software Encoding Schemes’ Resistance to Fault Injection Attacks
    Jakub Breier, Dirmanto Jap, and Shivam Bhasin
    In International Workshop on Security Proofs for Embedded Systems (PROOFS), 2016
  7. SPACE
    Cheap and cheerful: A low-cost digital sensor for detecting laser fault injection attacks
    Wei He, Jakub Breier, and Shivam Bhasin
    In International Conference on Security, Privacy, and Applied Cryptography Engineering, 2016
  8. SPACE
    Comprehensive Laser Sensitivity Profiling and Data Register Bit-Flips for Cryptographic Fault Attacks in 65 Nm FPGA
    Wei He, Jakub Breier, Shivam Bhasin, Dirmanto Jap, Hock Guan Ong, and Chee Lip Gan
    In Security, Privacy, and Applied Cryptography Engineering: 6th International Conference, SPACE 2016, Hyderabad, India, December 14-18, 2016, Proceedings, Dec 2016

2015

  1. CPSS
    Laser profiling for the back-side fault attacks: with a practical laser skip instruction attack on AES
    Jakub Breier, Dirmanto Jap, and Chien-Ning Chen
    In Proceedings of the 1st ACM Workshop on Cyber-Physical System Security, Dec 2015
  2. WESS
    Testing feasibility of back-side laser fault injection on a microcontroller
    Jakub Breier, and Dirmanto Jap
    In Proceedings of the WESS’15: Workshop on Embedded Systems Security, Dec 2015
  3. ICISA
    Anomaly detection from log files using data mining techniques
    Jakub Breier, and Jana Branišová
    In Information Science and Applications, Dec 2015
  4. SIoT
    Multiple fault attack on present with a hardware trojan implementation in fpga
    Jakub Breier, and Wei He
    In 2015 international workshop on secure internet of things (SIot), Dec 2015
  5. ICT
    Differential fault attack on LEA
    Dirmanto Jap, and Jakub Breier
    In Information and Communication Technology: Third IFIP TC 5/8 International Conference, ICT-EurAsia 2015, and 9th IFIP WG 8.9 Working Conference, CONFENIS 2015, Held as Part of WCC 2015, Daejeon, Korea, October 4-7, 2015, Proceedings 3, Dec 2015

2014

  1. ISIC
    Overview of machine learning based side-channel analysis methods
    Dirmanto Jap, and Jakub Breier
    In 2014 International Symposium on Integrated Circuits (ISIC), Dec 2014
  2. ICT
    Assets dependencies model in information security risk management
    Jakub Breier, and Frank Schindler
    In Information and Communication Technology: Second IFIP TC5/8 International Conference, ICT-EurAsia 2014, Bali, Indonesia, April 14-17, 2014. Proceedings 2, Dec 2014
  3. IST
    Security evaluation model based on the score of security mechanisms
    Jakub Breier
    Information Sciences and Technologies, Dec 2014
  4. JISIS
    Asset Valuation Method for Dependent Entities.
    Jakub Breier
    J. Internet Serv. Inf. Secur., Dec 2014
  5. ISIC
    A survey of the state-of-the-art fault attacks
    Jakub Breier, and Dirmanto Jap
    In 2014 International Symposium on Integrated Circuits (ISIC), Dec 2014
  6. ARES
    Qualified Electronic Signature via SIM Card Using JavaCard 3 Connected Edition Platform
    Jakub Breier, and Adam Pomothy
    In 2014 Ninth International Conference on Availability, Reliability and Security, Dec 2014

2013

  1. ICT
    On identifying proper security mechanisms
    Jakub Breier, and Ladislav Hudec
    In Information and Communication Technology: International Conference, ICT-EurAsia 2013, Yogyakarta, Indonesia, March 25-29, 2013. Proceedings 1, Dec 2013
  2. ARES
    On selecting critical security controls
    Jakub Breier, and Ladislav Hudec
    In 2013 International Conference on Availability, Reliability and Security, Dec 2013

2012

  1. ESTEL
    New approach in information system security evaluation
    Jakub Breier, and Ladislav Hudec
    In 2012 IEEE First AESS European Conference on Satellite Telecommunications (ESTEL), Dec 2012
  2. JEE
    On practical results of the differential power analysis
    Jakub Breier, and Marcel Kleja
    Journal of Electrical Engineering, Dec 2012
  3. CompSysTech
    Towards a security evaluation model based on security metrics
    Jakub Breier, and Ladislav Hudec
    In Proceedings of the 13th International Conference on Computer Systems and Technologies, Dec 2012
  4. IJITA
    Security Mechanisms Role in Information Security Evaluation
    Jakub Breier, and Ladislav Hudec
    International Journal of Information Technology Applications, Dec 2012

2011

  1. CompSysTech
    Risk analysis supported by information security metrics
    Jakub Breier, and Ladislav Hudec
    In Proceedings of the 12th International Conference on Computer Systems and Technologies, Dec 2011