Invited Talks

Fault Analysis Automation on Software Targets. Targetted Training on Advanced Side Channel Evaluation of Hardware Security (ASCEHS), IIT Kharagpur, India, 3 July 2018. [ pdf ]
Fault Injection Attacks and Countermeasures. Brno Security Meetings, FEKT VUT, Brno, Czech Republic, 28 March 2018. [ pdf ]
Fault Attacks on Cryptographic Devices. IEEE CS/SMCS Austria Chapter, SBA Research, Vienna, Austria, 18 May 2016. [ pdf ]
Security Evaluation Supported by Information Security Mechanisms. TUM EI SEC PhD Seminar, TUM, Munich, Germany, 25 June 2014. [ pdf ]

Publications

Book Chapters

[A] Jakub Breier, Wei He, and Shivam Bhasin. Reactive Design Strategies Against Fault Injection Attacks. In Fault Tolerant Architectures for Cryptography and Hardware Security, edited by Sikhar Patranabis and Debdeep Mukhopadhyay, Springer, 213--229, 2018.
[B] Jakub Breier, Dirmanto Jap, and Chien-Ning Chen. Laser-Based Fault Injection on Microcontrollers. In Fault Tolerant Architectures for Cryptography and Hardware Security, edited by Sikhar Patranabis and Debdeep Mukhopadhyay, Springer, 81--110, 2018.
[C] Sikhar Patranabis, Jakub Breier, Debdeep Mukhopadhyay, and Shivam Bhasin. Side-Channel Assisted Fault Analysis. In Fault Tolerant Architectures for Cryptography and Hardware Security, edited by Sikhar Patranabis and Debdeep Mukhopadhyay, Springer, 59--77, 2018.

Journals

[] Jakub Breier, Xiaolu Hou and Liu Yang. Fault Attacks Made Easy: Differential Fault Analysis Automation on Assembly Code. Transactions on Cryptographic Hardware and Embedded Systems, IACR, 1 (2), 96--122, 2018. pdf (ext) ]
[] Jakub Breier, Dirmanto Jap and Shivam Bhasin. A Study on Analyzing Side-Channel Resistant Encoding Schemes with Respect to Fault Attacks. Journal of Cryptographic Engineering, Springer, 7 (4), 311--320, 2017. pdf (ext) ]
[] Jakub Breier, Wei He, Dirmanto Jap, Shivam Bhasin and Anupam Chattopadhyay. Attacks in Reality: The Limits of Concurrent Error Detection Codes against Laser Fault Injection. Journal of Hardware and Systems Security, Springer, 1 (4), 298--310, 2017. pdf ]
[] Jakub Breier, Wei He, Shivam Bhasin, Dirmanto Jap, Samuel Chef, Hock Guan Ong and Chee Lip Gan. Extensive Laser Fault Injection Profiling of 65 nm FPGA. Journal of Hardware and Systems Security, Springer, 1 (3), 237--251, 2017. pdf (ext) ]
[] Jakub Breier and Jana Branišová. A dynamic rule creation based anomaly detection method for identifying security breaches in log records. Wireless Personal Communications, Springer, 94 (3), pages 497--511, 2017. [ bib ] [ pdf ]
[] Jakub Breier. Asset valuation method for dependent entities. Journal of Internet Services and Information Security, 4(3):72--81, 2014. [ bib ] [ pdf (ext) ]
[] Jakub Breier and Marcel Kleja. On practical results of the differential power analysis. Journal of Electrical Engineering, 63(2):125--129, 2012. [ bib ] [ pdf (ext) ]
[] Jakub Breier and Ladislav Hudec. Security mechanisms role in information security evaluation. Information Technology Applications, 1(2):5--15, 2012. [ bib ]

Conference Proceedings

2018

[] Jakub Breier, Xiaolu Hou, Dirmanto Jap, Lei Ma, Shivam Bhasin, and Yang Liu. Practical Fault Attack on Deep Neural Networks. In 2018 ACM SIGSAC Conference on Computer & Communications Security (CCS), pages 2204--2206. ACM, Oct 2018. [ pdf (original), pdf (external link; extended arXiv version)  ]
[] Sayandeep Saha, Dirmanto Jap, Jakub Breier, Shivam Bhasin, Debdeep Mukhopadhyay, and Pallab Dasgupta. Breaking Redundancy-Based Countermeasures with Random Faults and Power Side Channel (To appear). In Fault Diagnosis and Tolerance in Cryptography (FDTC), pages 1--8. IEEE, Sep 2018. [ pdf ]
[] Samuel Chef, Chung Tah Chua, Jing Yun Tay, Yu Wen Siah, Shivam Bhasin, Jakub Breier, and Chee Lip Gan. Descrambling of Embedded SRAM Using a Laser Probe. In IEEE International Symposium on the Physical and Failure Analysis of Integrated Circuits (IPFA), pages 1--6. IEEE, July 2018. [ pdf ]
[] Prasanna Ravi, Shivam Bhasin, Jakub Breier and Anupam Chattopadhyay. PPAP and iPPAP: PLL-based Protection Against Physical Attacks (To appear). In 2018 IEEE Computer Society Annual Symposium on VLSI (ISVLSI), pages 1--6. IEEE, July 2018. [ pdf ]
[] Anubhab Baksi, Shivam Bhasin, Jakub Breier, Mustafa Khairallah and Thomas Peyrin. Protecting Block Ciphers against Differential Fault Attacks without Re-keying. In 2018 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pages 191--194. IEEE, April/May 2018. [ pdf (external link; extended ePrint version) ]
[] Jakub Breier, Dirmanto Jap and Shivam Bhasin. SCADPA: Side-Channel Assisted Differential-Plaintext Attack on Bit Permutation Based Ciphers. In Design, Automation and Test in Europe (DATE), pages 1129--1134. IEEE, March 2018. [ pdf (external link) ]
[] Mustafa Khairallah, Rajat Sadhukhan, Radhamanjari Samanta, Jakub Breier, Shivam Bhasin, Rajat Subhra Chakraborty, Anupam Chattopadhyay and Debdeep Mukhopadhyay. DFARPA: Differential Fault Attack Resistant Physical Design Automation. In Design, Automation and Test in Europe (DATE), pages 1171--1174. IEEE, March 2018. [ pdf ]

2017

[] Sikhar Patranabis, Debdeep Mukhopadhyay, Jakub Breier, and Shivam Bhasin. One Plus One is More than Two: A Practical Combination of Power and Fault Analysis Attacks on PRESENT and PRESENT-like Block Ciphers. In Fault Diagnosis and Tolerance in Cryptography (FDTC), pages 25--32. IEEE, Sep 2017. [ pdf ]
[] S V Dilip Kumar, Sikhar Patranabis, Jakub Breier, Debdeep Mukhopadhyay, Shivam Bhasin, Anupam Chattopadhyay and Anubhab Baksi. A Practical Fault Attack on ARX-like Ciphers with a Case Study on ChaCha20. In Fault Diagnosis and Tolerance in Cryptography (FDTC), pages 33--40. IEEE, Sep 2017. [ pdf ]
[] Jakub Breier and Xiaolu Hou. Feeding two cats with one bowl: On designing a fault and side-channel resistant software encoding scheme. In RSA Conference Cryptographers' Track (CT-RSA 2017), pages 77--94, Feb 2017. [ bib ] [ pdf (external link) ]
[] Jakub Breier, Wei He and Shivam Bhasin. An Electromagnetic Fault Injection Sensor using Hogge Phase-Detector. In International Symposium on Quality Electronic Design (ISQED 2017), pages 307--312. IEEE, March 2017. [ bib ] [ pdf ]
[] Wei He, Jakub Breier, and Shivam Bhasin. An FPGA-compatible PLL-based sensor against fault injection attack. In Proceedings of the 22nd Asia and South Pacific Design Automation Conference (ASP-DAC 2017), pages 39--40, Jan 2017. [ bib ] [ pdf ]

2016

[] Wei He, Jakub Breier, Shivam Bhasin, Dirmanto Jap, Hock Guan Ong, and Chee Lip Gan. Comprehensive laser sensitivity profiling and data register bit-flips in 65 nm FPGA. In International Conference on Security, Privacy and Applied Cryptographic Engineering (SPACE'16), pages 47--65, Dec 2016. [ bib ] [ pdf ]
[] Wei He, Jakub Breier, and Shivam Bhasin. Cheap and cheerful: A low-cost digital sensor for detecting laser fault injection attacks. In International Conference on Security, Privacy and Applied Cryptographic Engineering (SPACE'16), pages 27--46, Dec 2016. [ bib ] [ pdf ]
[] Wei He, Jakub Breier, Shivam Bhasin, Noriyuki Miura, and Makoto Nagata. Ring oscillator under laser: Potential of pll based countermeasure against laser fault injection. In Fault Diagnosis and Tolerance in Cryptography (FDTC), pages 102--113. IEEE, Aug 2016. [ bib ] [ pdf ]
[] Jakub Breier. On analyzing program behavior under fault injection attacks. In Availability, Reliability and Security (ARES), 2016 Eleventh International Conference on, pages 474--479. IEEE, Aug 2016. [ bib ] [ pdf (external link) ]
[] Jakub Breier and Chien-Ning Chen. On determining optimal parameters for testing devices against laser fault attacks. In Proceedings of The 15th International Symposium on Integrated Circuits (ISIC), pages 1--4. IEEE, Dec 2016. [ bib ] [ pdf ]
[] Wei He, Jakub Breier, Shivam Bhasin, and Anupam Chattopadhyay. Bypassing parity protected cryptography using laser fault injection in cyber-physical system. In Proceedings of the 2nd ACM International Workshop on Cyber-Physical System Security, CPSS '16, pages 15--21, New York, NY, USA, May 2016. ACM. [ bib | DOI | http ]
[] Jakub Breier, Dirmanto Jap, and Shivam Bhasin. The other side of the coin: Analyzing software encoding schemes against fault injection attacks. In 2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pages 209--216, May 2016. [ bib | DOI ] [ pdf ]

2015

[] Jakub Breier and Wei He. Multiple fault attack on present with a hardware trojan implementation in fpga. In Linawati, MadeSudiana Mahendra, ErichJ. Neuhold, AMin Tjoa, and Ilsun You, editors, Proceedings of the 2015 Workshop on Secure Internet of Things (SIoT), Conference Publishing Services, pages 58--64. IEEE, Sep 2015. [ bib ] [ pdf ]
[] Dirmanto Jap and Jakub Breier. Differential fault attack on LEA. In Linawati, MadeSudiana Mahendra, ErichJ. Neuhold, AMin Tjoa, and Ilsun You, editors, Information and Communication Technology: Third IFIP TC 5/8 International Conference, ICT-EurAsia 2015, and 9th IFIP WG 8.9 Working Conference, CONFENIS 2015, Held as Part of WCC 2015, Lecture Notes in Computer Science, pages 265--274. Springer Berlin Heidelberg, Oct 2015. [ bib ] [ pdf ]
[] Jakub Breier and Dirmanto Jap. Testing feasibility of back-side laser fault injection on a microcontroller. In Proceedings of the WESS'15: Workshop on Embedded Systems Security, WESS'15, pages 5:1--5:6, New York, NY, USA, 2015. ACM. [ bib | DOI | http ] [ pdf ]
[] Jakub Breier, Dirmanto Jap, and Chien-Ning Chen. Laser profiling for the back-side fault attacks (with a practical laser clock glitch attack on aes). In First Cyber-Physical System Security Workshop (CPSS 2015), pages 99--103. ACM, Apr 2015. [ bib ] [ pdf ]
[] Jakub Breier and Jana Branišová. Anomaly detection from log files using data mining techniques. In Information Science and Applications (ICISA), 2015 Sixth International Conference on, pages 449--457. Springer, Feb 2015. [ bib ] [ pdf ]

2014

[] Jakub Breier and Adam Pomothy. Qualified electronic signature via sim card using javacard 3 connected edition platform. In Availability, Reliability and Security (ARES), 2014 Ninth International Conference on, pages 349--355. IEEE, Sept 2014. [ bib | DOI ] [ pdf ]
[] Jakub Breier and Dirmanto Jap. A survey of the state-of-the-art fault attacks. In Proceedings of The 14th International Symposium on Integrated Circuits (ISIC), pages 152--155. IEEE, Dec 2014. [ bib ] [ pdf ]
[] Dirmanto Jap and Jakub Breier. Comparison of machine-learning based side-channel analysis methods. In Proceedings of The 14th International Symposium on Integrated Circuits (ISIC), pages 38--41. IEEE, Dec 2014. [ bib ]
[] Jakub Breier and Frank Schindler. Assets dependencies model in information security risk management. In Linawati, MadeSudiana Mahendra, ErichJ. Neuhold, AMin Tjoa, and Ilsun You, editors, Proceedings of the 2014 International Conference on Information and Communication Technology, volume 8407 of Lecture Notes in Computer Science, pages 405--412. Springer Berlin Heidelberg, 2014. [ bib | DOI | http ] [ pdf ]

2011 - 2013

[] Jakub Breier and Ladislav Hudec. On selecting critical security controls. In Availability, Reliability and Security (ARES), 2013 Eighth International Conference on, pages 582--588. IEEE, Sept 2013. [ bib | DOI ]
[] Jakub Breier and Ladislav Hudec. On identifying proper security mechanisms. In Proceedings of the 2013 International Conference on Information and Communication Technology, ICT-EurAsia'13, pages 285--294, Berlin, Heidelberg, 2013. Springer-Verlag. [ bib | DOI | http ]
[] Jakub Breier and Ladislav Hudec. New approach in information system security evaluation. In Satellite Telecommunications (ESTEL), 2012 IEEE First AESS European Conference on, pages 1--6. IEEE, Oct 2012. [ bib | DOI ]
[] Jakub Breier and Ladislav Hudec. Towards a security evaluation model based on security metrics. In Proceedings of the 13th International Conference on Computer Systems and Technologies, CompSysTech '12, pages 87--94, New York, NY, USA, 2012. ACM. [ bib | DOI | http ]
[] Jakub Breier. Information system security assessment method based on security mechanisms. In Proceedings in Informatics and Information Technologies, IIT.SRC '12, pages 141--150, Bratislava, Slovakia, 2012. STU. [ bib ]
[] Jakub Breier and Ladislav Hudec. Risk analysis supported by information security metrics. In Proceedings of the 12th International Conference on Computer Systems and Technologies, CompSysTech '11, pages 393--398, New York, NY, USA, 2011. ACM. [ bib | DOI | http ]