Jakub Breier
I am a hardware security researcher with 10+ years of experience in fault injection, side-channel analysis, cryptography, and AI model security, spanning top academic venues (2,400+ citations, h-index 28) and safety-critical industry applications. My work bridges deep implementation-level security research with real-world deployment in automotive and embedded systems.
Currently, I lead the security strategy at TTControl GmbH in Vienna, where I oversee the end-to-end security lifecycle and ISO/SAE 21434 compliance for the company portfolio of automotive/off-highway Electronic Control Units (ECUs) and Human-Machine Interfaces (HMIs).
Core Impact & Expertise
- Hardware Security Depth: Recognized expert in Fault Injection Attacks (FIA), Side-Channel Analysis (SCA), Symmetric Cryptography (Co-author of DEFAULT, Baksheesh), and Post-Quantum Cryptography (Co-author of ASCON-SIGN, a NIST PQC round 1 candidate). Author of Cryptography and Embedded Systems Security (Springer, 2024).
- Global Regulatory Governance: Deep familiarity with EU Cyber Resilience Act (CRA) and Machinery Regulation compliance in safety-critical automotive contexts.
- Safety-Security Integration: Designing certifiable security architectures that coexist with high-integrity functional safety (ISO 26262 / ASIL-D) requirements.
Professional Background
Before my current role, I served as a Senior Scientist at Silicon Austria Labs, Principal Research Fellow at HP-NTU Digital Manufacturing Corporate Lab, and held various research-related roles at Underwriters Laboratories (UL), and Temasek Laboratories in Singapore. This trajectory from high-end evaluation labs to industrial leadership allows me to manage security not just as a “checklist,” but as a resilient technical moat.
I hold a Ph.D. in Information Security and am a Certified Information Systems Security Professional (CISSP) and Certified Automotive Cybersecurity Professional (CACSP). My core belief: meaningful hardware security research must be rooted in understanding how attacks work at the silicon level – and how real systems fail.
news
| Feb 1, 2026 | I will serve as a co-chair of the Hardware and System Security track at The IEEE/ACM International Symposium on Low Power Electronics and Design ISLPED 2026. |
|---|---|
| Dec 10, 2025 | I will serve on the Editorial Board of the IACR Communications in Cryptology 2026 CiC. |
| Nov 1, 2025 | I will serve on the PC of the Hardware Security: Attack and Defense track at The Chips To Systems Conference DAC 2026. |
| Sep 1, 2025 | I will serve on the PC of the IEEE International Symposium on Hardware Oriented Security and Trust HOST 2026. |
selected publications
- CCSPractical Fault Attack on Deep Neural NetworksIn Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
- TVLSIMake Shuffling Great Again: A Side-Channel Resistant Fisher-Yates Algorithm for Protecting Neural NetworksIEEE Transactions on Very Large Scale Integration (VLSI) Systems, 2025
- ARESSide-Channel Analysis of OpenVINO-Based Neural Network ModelsIn International Conference on Availability, Reliability and Security, 2025