Invited Talks

Hardware Security of Cryptography and Deep Learning. Dealer Seminar, Palo Alto Research Center (PARC), Palo Alto, CA, USA (Online), 30 August 2022. [ pdf ]
Cryptography in Payment Systems. SEAMS-UGM- ITB Summer Course on Coding Theory and Cryptography, Yogyakarta, Indonesia, 26 July 2019. [ pdf ]
Automated Fault Analysis of Block Cipher Implementations. SEAMS-UGM- ITB Summer Course on Coding Theory and Cryptography, Yogyakarta, Indonesia, 25 July 2019. [ pdf (same as RSAC'19) ]
Automated Fault Analysis of Block Cipher Implementations. RSA Conference 2019, San Francisco, CA, USA, 6 March 2019. [ pdf ]
Fault Analysis Automation on Software Targets. Targetted Training on Advanced Side Channel Evaluation of Hardware Security (ASCEHS), IIT Kharagpur, India, 3 July 2018. [ pdf ]
Fault Injection Attacks and Countermeasures. Brno Security Meetings, FEKT VUT, Brno, Czech Republic, 28 March 2018. [ pdf ]
Fault Attacks on Cryptographic Devices. IEEE CS/SMCS Austria Chapter, SBA Research, Vienna, Austria, 18 May 2016. [ pdf ]
Security Evaluation Supported by Information Security Mechanisms. TUM EI SEC PhD Seminar, TUM, Munich, Germany, 25 June 2014. [ pdf ]

Publications

Book

Automated Methods in Cryptographic Fault Analysis. Jakub Breier, Xiaolu Hou and Shivam Bhasin (Eds.). ISBN: 978-3-030-11332-2, 334 pages, Springer, 2019. [ Springer Link ]

Book Chapters

[A] Lejla Batina, Shivam Bhasin, Jakub Breier, Xiaolu Hou and Dirmanto Jap:. On Implementation-Level Security of Edge-Based Machine Learning Models. In Security and Artificial Intelligence - A Crossdisciplinary Approach edited by Lejla Batina, Thomas Bäck, Ileana Buhan and Stjepan Picek, Lecture Notes in Computer Science 13049, Springer, 335--359, 2022.
[B] Jakub Breier, Wei He and Shivam Bhasin. Reactive Design Strategies Against Fault Injection Attacks. In Fault Tolerant Architectures for Cryptography and Hardware Security, edited by Sikhar Patranabis and Debdeep Mukhopadhyay, Springer, 213--229, 2018.
[C] Jakub Breier, Dirmanto Jap and Chien-Ning Chen. Laser-Based Fault Injection on Microcontrollers. In Fault Tolerant Architectures for Cryptography and Hardware Security, edited by Sikhar Patranabis and Debdeep Mukhopadhyay, Springer, 81--110, 2018.
[D] Sikhar Patranabis, Jakub Breier, Debdeep Mukhopadhyay and Shivam Bhasin. Side-Channel Assisted Fault Analysis. In Fault Tolerant Architectures for Cryptography and Hardware Security, edited by Sikhar Patranabis and Debdeep Mukhopadhyay, Springer, 59--77, 2018.

Journals

2022

[] Xiaolu Hou, Jakub Breier and Shivam Bhasin. SBCMA: Semi-Blind Combined Middle-Round Attack on Bit-Permutation Ciphers With Application to AEAD Schemes. Transactions on Information Forensics and Security, IEEE, vol. 17, 3677--3690, 2022. [ pdf ]
[] Jakub Breier and Xiaolu Hou. How Practical are Fault Injection Attacks, Really? (To appear) IEEE Access, 1--9, 2022. [ pdf (ext) ]
[] Jakub Breier, Xiaolu Hou, Martìn Ochoa and Jesus Solano. FooBaR: Fault Fooling Backdoor Attack on Neural Network Training (to appear). Transactions on Dependable and Secure Computing, IEEE, 1--14, 2022. pdf ]
[] Anubhab Baksi, Shivam Bhasin, Jakub Breier, Dirmanto Jap and Dhiman Saha. A Survey on Fault Attacks on Symmetric Key Cryptosystems (to appear). Computing Surveys, ACM, 1--35, 2022. pdf ]
[] Satyam Kumar, Vishnu Asutosh Dasu, Anubhab Baksi, Santanu Sarkar, Dirmanto Jap, Jakub Breier and Shivam Bhasin. Side Channel Attack On Stream Ciphers: A Three-Step Approach To State/Key Recovery. Transactions on Cryptographic Hardware and Embedded Systems, IACR, 5 (2), 166--191, 2022. pdf ]
[] Francesco Berti, Shivam Bhasin, Jakub Breier, Xiaolu Hou, Romain Poussier, François-Xavier Standaert and Balasz Udvarhelyi. A Finer-Grain Analysis of the Leakage (Non) Resilience of OCB. Transactions on Cryptographic Hardware and Embedded Systems, IACR, 5 (1), 461--481, 2022. pdf (ext) ]

2021

[] Jakub Breier, Dirmanto Jap, Xiaolu Hou, Shivam Bhasin and Yang Liu. SNIFF: Reverse Engineering of Neural Networks with Fault Attacks (to appear). Transactions on Reliability, IEEE, 1--13, 2021. [ pdf ]
[] Yoo-Seung Won, Xiaolu Hou, Dirmanto Jap, Jakub Breier and Shivam Bhasin. Back to the Basics: Seamless Integration of Side-Channel Pre-Processing in Deep Neural Networks. Transactions on Information Forensics and Security, IEEE, vol. 16, 3215--3227, 2021. [ pdf ]
[] Xiaolu Hou, Jakub Breier, Dirmanto Jap, Lei Ma, Shivam Bhasin and Yang Liu. Physical security of deep learning on edge devices: Comprehensive evaluation of fault injection attack vectors. Microelectronics Reliability, Elsevier, vol. 120, 114--116, 2021. [ pdf ]
[] Jakub Breier, Xiaolu Hou and Yang Liu. On Evaluating Fault Resilient Encoding Schemes in Software. Transactions on Dependable and Secure Computing, IEEE, vol. 18 (3), 1065--1079, 2021. [ pdf (ext) ]

2020

[] Jakub Breier, Mustafa Khairallah, Xiaolu Hou and Yang Liu. A Countermeasure Against Statistical Ineffective Fault Analysis. Transactions on Circuits and Systems II: Express Briefs, IEEE, vol. 67 (12), 3322--3326, 2020. [ pdf (ext) ]
[] Manaar Alam, Arnab Bag, Debapriya Basu Roy, Dirmanto Jap, Jakub Breier, Shivam Bhasin and Debdeep Mukhopadhyay. Neural Network-based Inherently Fault-tolerant Hardware Cryptographic Primitives without Explicit Redundancy Checks. Journal On Emerging Technologies In Computing Systems, ACM, vol. 17 (1), 1--30, 2020. [ pdf (ext) ]
[] Shivam Bhasin, Jakub Breier, Xiaolu Hou, Dirmanto Jap, Romain Poussier and Siang Meng Sim. SITM: See-In-The-Middle -- Side-Channel Assisted Middle Round Differential Cryptanalysis on SPN Block Ciphers. Transactions on Cryptographic Hardware and Embedded Systems, IACR, 3 (1), 95--122, 2020. pdf (ext) ]
[] Jakub Breier, Dirmanto Jap, Xiaolu Hou and Shivam Bhasin. On Side Channel Vulnerabilities of Bit Permutations in Cryptographic Algorithms. Transactions on Information Forensics and Security, IEEE, vol. 15, 1072--1085, 2020. [ pdf ]

2019

[] Xiaolu Hou, Jakub Breier, Fuyuan Zhang and Yang Liu. Fully Automated Differential Fault Analysis on Software Implementations of Block Ciphers. Transactions on Cryptographic Hardware and Embedded Systems, IACR, 2 (3), 1--29, 2019. pdf (ext) ]
[] Sikhar Patranabis, Nilanjan Datta, Dirmanto Jap, Jakub Breier, Shivam Bhasin and Debdeep Mukhopadhyay. SCADFA: Combined SCA+DFA Attacks on Block Ciphers with Practical Validations. Transactions on Computers, IEEE, 68 (10), 1498--1510, 2019. pdf ]

2018

[] Jakub Breier, Xiaolu Hou and Yang Liu. Fault Attacks Made Easy: Differential Fault Analysis Automation on Assembly Code. Transactions on Cryptographic Hardware and Embedded Systems, IACR, 1 (2), 96--122, 2018. pdf (ext) ]

2017

[] Jakub Breier, Dirmanto Jap and Shivam Bhasin. A Study on Analyzing Side-Channel Resistant Encoding Schemes with Respect to Fault Attacks. Journal of Cryptographic Engineering, Springer, 7 (4), 311--320, 2017. pdf (ext) ]
[] Jakub Breier, Wei He, Dirmanto Jap, Shivam Bhasin and Anupam Chattopadhyay. Attacks in Reality: The Limits of Concurrent Error Detection Codes against Laser Fault Injection. Journal of Hardware and Systems Security, Springer, 1 (4), 298--310, 2017. pdf ]
[] Jakub Breier, Wei He, Shivam Bhasin, Dirmanto Jap, Samuel Chef, Hock Guan Ong and Chee Lip Gan. Extensive Laser Fault Injection Profiling of 65 nm FPGA. Journal of Hardware and Systems Security, Springer, 1 (3), 237--251, 2017. pdf (ext) ]
[] Jakub Breier and Jana Branišová. A dynamic rule creation based anomaly detection method for identifying security breaches in log records. Wireless Personal Communications, Springer, 94 (3), pages 497--511, 2017. [ bib ] [ pdf ]

2014

[] Jakub Breier. Asset valuation method for dependent entities. Journal of Internet Services and Information Security, 4(3):72--81, 2014. [ bib ] [ pdf (ext) ]

2012

[] Jakub Breier and Marcel Kleja. On practical results of the differential power analysis. Journal of Electrical Engineering, 63(2):125--129, 2012. [ bib ] [ pdf (ext) ]
[] Jakub Breier and Ladislav Hudec. Security mechanisms role in information security evaluation. Information Technology Applications, 1(2):5--15, 2012. [ bib ]

Conference Proceedings

2022

[] Anubhab Baksi, Arghya Bhattacharjee, Jakub Breier, Takanori Isobe and Mridul Nandi. Big Brother is Watching You: A Closer Look at Backdoor Construction (To appear). In International Conference on Security, Privacy and Applied Cryptographic Engineering (SPACE'22). Springer, December 2022. [ pdf ]

2021

[] Anubhab Baksi, Shivam Bhasin, Jakub Breier, Mustafa Khairallah, Thomas Peyrin, Sumanta Sarkar, Siang Meng Sim. DEFAULT: Cipher Level Resistance Against Differential Fault Attack. In 27th Annual International Conference on the Theory and Application of Cryptology and Information Security (Asiacrypt). Springer, December 2021. [ pdf (ext) ]
[] Anubhab Baksi, Jakub Breier, Yi Chen and Xiaoyang Dong. Machine Learning Assisted Differential Distinguishers For Lightweight Ciphers. In Design, Automation and Test in Europe (DATE). IEEE, February 2021. [ pdf (external link; extended ePrint version) ]
[] Xiaolu Hou, Jakub Breier and Shivam Bhasin. DNFA: Differential No-Fault Analysis of Bit Permutation Based Ciphers Assisted by Side-Channel. In Design, Automation and Test in Europe (DATE). IEEE, February 2021. [ pdf ]
[] Anubhab Baksi, Shivam Bhasin, Jakub Breier, Anupam Chattopadhyay and Vinay B. Y. Kumar:. Feeding Three Birds With One Scone: A Generic Duplication Based Countermeasure To Fault Attacks. In Design, Automation and Test in Europe (DATE). IEEE, February 2021. [ pdf ]
[] Anubhab Baksi, Jakub Breier, Vishnu Asutosh Dasu and Xiaolu Hou. Machine Learning Attacks On SPECK. In Security and Implementation of Lightweight Cryptography (SILC), ESAT KU Leuven, 2021. [ pdf (ext)  ]

2020

[] Xiaolu Hou, Jakub Breier, Dirmanto Jap, Lei Ma, Shivam Bhasin, and Yang Liu. Security Evaluation of Deep Neural Network Resistance Against Laser Fault Injection. In 27th International Symposium on the Physical and Failure Analysis of Integrated Circuits (IPFA 2020). [ pdf  ]
[] Anubhab Baksi, Jakub Breier, Vishnu Asutosh Dasu, Xiaoyang Dong and Yi Chen. Following-up On Machine Learning Assisted Differential Distinguishers. In Security and Implementation of Lightweight Cryptography (SILC), ESAT KU Leuven, 2020. [ pdf (ext)  ]

2019

[] Mustafa Khairallah, Xiaolu Hou, Zakaria Najm, Jakub Breier. Shivam Bhasin and Thomas Peyrin. SoK : On DFA Vulnerabilities of Substitution-Permutation Networks. In 2019 ACM SIGSAC Asia Conference on Computer and Communications Security (AsiaCCS 2019), pages 403--414. ACM, July 2019. [ pdf (external link; extended ePrint version) ]

2018

[] Jakub Breier, Xiaolu Hou, Dirmanto Jap, Lei Ma, Shivam Bhasin, and Yang Liu. Practical Fault Attack on Deep Neural Networks. In 2018 ACM SIGSAC Conference on Computer & Communications Security (CCS), pages 2204--2206. ACM, Oct 2018. [ pdf (original), pdf (external link; extended arXiv version)  ]
[] Sayandeep Saha, Dirmanto Jap, Jakub Breier, Shivam Bhasin, Debdeep Mukhopadhyay, and Pallab Dasgupta. Breaking Redundancy-Based Countermeasures with Random Faults and Power Side Channel. In Fault Diagnosis and Tolerance in Cryptography (FDTC), pages 15--22. IEEE, Sep 2018. [ pdf ]
[] Samuel Chef, Chung Tah Chua, Jing Yun Tay, Yu Wen Siah, Shivam Bhasin, Jakub Breier, and Chee Lip Gan. Descrambling of Embedded SRAM Using a Laser Probe. In IEEE International Symposium on the Physical and Failure Analysis of Integrated Circuits (IPFA), pages 1--6. IEEE, July 2018. [ pdf ]
[] Prasanna Ravi, Shivam Bhasin, Jakub Breier and Anupam Chattopadhyay. PPAP and iPPAP: PLL-based Protection Against Physical Attacks. In 2018 IEEE Computer Society Annual Symposium on VLSI (ISVLSI), pages 620--625. IEEE, July 2018. [ pdf ]
[] Anubhab Baksi, Shivam Bhasin, Jakub Breier, Mustafa Khairallah and Thomas Peyrin. Protecting Block Ciphers against Differential Fault Attacks without Re-keying. In 2018 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pages 191--194. IEEE, April/May 2018. [ pdf (external link; extended ePrint version) ]
[] Jakub Breier, Dirmanto Jap and Shivam Bhasin. SCADPA: Side-Channel Assisted Differential-Plaintext Attack on Bit Permutation Based Ciphers. In Design, Automation and Test in Europe (DATE), pages 1129--1134. IEEE, March 2018. [ pdf (external link) ]
[] Mustafa Khairallah, Rajat Sadhukhan, Radhamanjari Samanta, Jakub Breier, Shivam Bhasin, Rajat Subhra Chakraborty, Anupam Chattopadhyay and Debdeep Mukhopadhyay. DFARPA: Differential Fault Attack Resistant Physical Design Automation. In Design, Automation and Test in Europe (DATE), pages 1171--1174. IEEE, March 2018. [ pdf ]

2017

[] Sikhar Patranabis, Debdeep Mukhopadhyay, Jakub Breier, and Shivam Bhasin. One Plus One is More than Two: A Practical Combination of Power and Fault Analysis Attacks on PRESENT and PRESENT-like Block Ciphers. In Fault Diagnosis and Tolerance in Cryptography (FDTC), pages 25--32. IEEE, Sep 2017. [ pdf ]
[] S V Dilip Kumar, Sikhar Patranabis, Jakub Breier, Debdeep Mukhopadhyay, Shivam Bhasin, Anupam Chattopadhyay and Anubhab Baksi. A Practical Fault Attack on ARX-like Ciphers with a Case Study on ChaCha20. In Fault Diagnosis and Tolerance in Cryptography (FDTC), pages 33--40. IEEE, Sep 2017. [ pdf ]
[] Jakub Breier and Xiaolu Hou. Feeding two cats with one bowl: On designing a fault and side-channel resistant software encoding scheme. In RSA Conference Cryptographers' Track (CT-RSA 2017), pages 77--94, Feb 2017. [ bib ] [ pdf (external link) ]
[] Jakub Breier, Wei He and Shivam Bhasin. An Electromagnetic Fault Injection Sensor using Hogge Phase-Detector. In International Symposium on Quality Electronic Design (ISQED 2017), pages 307--312. IEEE, March 2017. [ bib ] [ pdf ]
[] Wei He, Jakub Breier, and Shivam Bhasin. An FPGA-compatible PLL-based sensor against fault injection attack. In Proceedings of the 22nd Asia and South Pacific Design Automation Conference (ASP-DAC 2017), pages 39--40, Jan 2017. [ bib ] [ pdf ]

2016

[] Wei He, Jakub Breier, Shivam Bhasin, Dirmanto Jap, Hock Guan Ong, and Chee Lip Gan. Comprehensive laser sensitivity profiling and data register bit-flips in 65 nm FPGA. In International Conference on Security, Privacy and Applied Cryptographic Engineering (SPACE'16), pages 47--65, Dec 2016. [ bib ] [ pdf ]
[] Wei He, Jakub Breier, and Shivam Bhasin. Cheap and cheerful: A low-cost digital sensor for detecting laser fault injection attacks. In International Conference on Security, Privacy and Applied Cryptographic Engineering (SPACE'16), pages 27--46, Dec 2016. [ bib ] [ pdf ]
[] Wei He, Jakub Breier, Shivam Bhasin, Noriyuki Miura, and Makoto Nagata. Ring oscillator under laser: Potential of pll based countermeasure against laser fault injection. In Fault Diagnosis and Tolerance in Cryptography (FDTC), pages 102--113. IEEE, Aug 2016. [ bib ] [ pdf ]
[] Jakub Breier. On analyzing program behavior under fault injection attacks. In Availability, Reliability and Security (ARES), 2016 Eleventh International Conference on, pages 474--479. IEEE, Aug 2016. [ bib ] [ pdf (external link) ]
[] Jakub Breier and Chien-Ning Chen. On determining optimal parameters for testing devices against laser fault attacks. In Proceedings of The 15th International Symposium on Integrated Circuits (ISIC), pages 1--4. IEEE, Dec 2016. [ bib ] [ pdf ]
[] Wei He, Jakub Breier, Shivam Bhasin, and Anupam Chattopadhyay. Bypassing parity protected cryptography using laser fault injection in cyber-physical system. In Proceedings of the 2nd ACM International Workshop on Cyber-Physical System Security, CPSS '16, pages 15--21, New York, NY, USA, May 2016. ACM. [ bib | DOI | http ]
[] Jakub Breier, Dirmanto Jap, and Shivam Bhasin. The other side of the coin: Analyzing software encoding schemes against fault injection attacks. In 2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pages 209--216, May 2016. [ bib | DOI ] [ pdf ]

2015

[] Jakub Breier and Wei He. Multiple fault attack on present with a hardware trojan implementation in fpga. In Linawati, MadeSudiana Mahendra, ErichJ. Neuhold, AMin Tjoa, and Ilsun You, editors, Proceedings of the 2015 Workshop on Secure Internet of Things (SIoT), Conference Publishing Services, pages 58--64. IEEE, Sep 2015. [ bib ] [ pdf ]
[] Dirmanto Jap and Jakub Breier. Differential fault attack on LEA. In Linawati, MadeSudiana Mahendra, ErichJ. Neuhold, AMin Tjoa, and Ilsun You, editors, Information and Communication Technology: Third IFIP TC 5/8 International Conference, ICT-EurAsia 2015, and 9th IFIP WG 8.9 Working Conference, CONFENIS 2015, Held as Part of WCC 2015, Lecture Notes in Computer Science, pages 265--274. Springer Berlin Heidelberg, Oct 2015. [ bib ] [ pdf ]
[] Jakub Breier and Dirmanto Jap. Testing feasibility of back-side laser fault injection on a microcontroller. In Proceedings of the WESS'15: Workshop on Embedded Systems Security, WESS'15, pages 5:1--5:6, New York, NY, USA, 2015. ACM. [ bib | DOI | http ] [ pdf ]
[] Jakub Breier, Dirmanto Jap, and Chien-Ning Chen. Laser profiling for the back-side fault attacks (with a practical laser clock glitch attack on aes). In First Cyber-Physical System Security Workshop (CPSS 2015), pages 99--103. ACM, Apr 2015. [ bib ] [ pdf ]
[] Jakub Breier and Jana Branišová. Anomaly detection from log files using data mining techniques. In Information Science and Applications (ICISA), 2015 Sixth International Conference on, pages 449--457. Springer, Feb 2015. [ bib ] [ pdf ]

2014

[] Jakub Breier and Adam Pomothy. Qualified electronic signature via sim card using javacard 3 connected edition platform. In Availability, Reliability and Security (ARES), 2014 Ninth International Conference on, pages 349--355. IEEE, Sept 2014. [ bib | DOI ] [ pdf ]
[] Jakub Breier and Dirmanto Jap. A survey of the state-of-the-art fault attacks. In Proceedings of The 14th International Symposium on Integrated Circuits (ISIC), pages 152--155. IEEE, Dec 2014. [ bib ] [ pdf ]
[] Dirmanto Jap and Jakub Breier. Comparison of machine-learning based side-channel analysis methods. In Proceedings of The 14th International Symposium on Integrated Circuits (ISIC), pages 38--41. IEEE, Dec 2014. [ bib ]
[] Jakub Breier and Frank Schindler. Assets dependencies model in information security risk management. In Linawati, MadeSudiana Mahendra, ErichJ. Neuhold, AMin Tjoa, and Ilsun You, editors, Proceedings of the 2014 International Conference on Information and Communication Technology, volume 8407 of Lecture Notes in Computer Science, pages 405--412. Springer Berlin Heidelberg, 2014. [ bib | DOI | http ] [ pdf ]

2011 - 2013

[] Jakub Breier and Ladislav Hudec. On selecting critical security controls. In Availability, Reliability and Security (ARES), 2013 Eighth International Conference on, pages 582--588. IEEE, Sept 2013. [ bib | DOI ]
[] Jakub Breier and Ladislav Hudec. On identifying proper security mechanisms. In Proceedings of the 2013 International Conference on Information and Communication Technology, ICT-EurAsia'13, pages 285--294, Berlin, Heidelberg, 2013. Springer-Verlag. [ bib | DOI | http ]
[] Jakub Breier and Ladislav Hudec. New approach in information system security evaluation. In Satellite Telecommunications (ESTEL), 2012 IEEE First AESS European Conference on, pages 1--6. IEEE, Oct 2012. [ bib | DOI ]
[] Jakub Breier and Ladislav Hudec. Towards a security evaluation model based on security metrics. In Proceedings of the 13th International Conference on Computer Systems and Technologies, CompSysTech '12, pages 87--94, New York, NY, USA, 2012. ACM. [ bib | DOI | http ]
[] Jakub Breier. Information system security assessment method based on security mechanisms. In Proceedings in Informatics and Information Technologies, IIT.SRC '12, pages 141--150, Bratislava, Slovakia, 2012. STU. [ bib ]
[] Jakub Breier and Ladislav Hudec. Risk analysis supported by information security metrics. In Proceedings of the 12th International Conference on Computer Systems and Technologies, CompSysTech '11, pages 393--398, New York, NY, USA, 2011. ACM. [ bib | DOI | http ]