Stjepan Picek

ORCID: 0000-0001-7509-4337
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cryptographic Implementations and Security
  • Advanced Malware Detection Techniques
  • Coding theory and cryptography
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Evolutionary Algorithms and Applications
  • Adversarial Robustness in Machine Learning
  • Chaos-based Image/Signal Encryption
  • Metaheuristic Optimization Algorithms Research
  • Digital Media Forensic Detection
  • graph theory and CDMA systems
  • Cellular Automata and Applications
  • Network Security and Intrusion Detection
  • Anomaly Detection Techniques and Applications
  • Privacy-Preserving Technologies in Data
  • Advanced Graph Neural Networks
  • Algorithms and Data Compression
  • DNA and Biological Computing
  • Advanced Multi-Objective Optimization Algorithms
  • Integrated Circuits and Semiconductor Failure Analysis
  • Error Correcting Code Techniques
  • Protein Degradation and Inhibitors
  • Advanced Memory and Neural Computing
  • Internet Traffic Analysis and Secure E-voting
  • Cell Image Analysis Techniques
  • Wireless Signal Modulation Classification

Radboud University Nijmegen
2014-2025

Delft University of Technology
2017-2024

Ikerlan
2023-2024

Université Paris 8
2016-2022

Université Paris Cité
2018-2022

Nanyang Technological University
2022

IEEE Computer Society
2021

STMicroelectronics (France)
2021

University of Bergen
2021

University of Zagreb
2009-2018

Profiled side-channel analysis based on deep learning, and more precisely Convolutional Neural Networks, is a paradigm showing significant potential. The results, although scarce for now, suggest that such techniques are even able to break cryptographic implementations protected with countermeasures. In this paper, we start by proposing new Network instance reach high performance number of considered datasets. We compare our neural network the one designed particular dataset masking...

10.46586/tches.v2019.i3.148-179 article EN cc-by IACR Transactions on Cryptographic Hardware and Embedded Systems 2019-05-09

Deep learning represents a powerful set of techniques for profiling sidechannel analysis. The results in the last few years show that neural network architectures like multilayer perceptron and convolutional networks give strong attack performance where it is possible to break targets protected with various countermeasures. Considering deep commonly have plethora hyperparameters tune, clear such top can come high price preparing attack. This especially problematic as side-channel community...

10.46586/tches.v2021.i3.677-707 article EN cc-by IACR Transactions on Cryptographic Hardware and Embedded Systems 2021-07-09

We concentrate on machine learning techniques used for profiled sidechannel analysis in the presence of imbalanced data. Such scenarios are realistic and often occurring, instance Hamming weight or distance leakage models. In order to deal with data, we use various balancing show that most them help mounting successful attacks when data is highly imbalanced. Especially, results SMOTE technique encouraging, since observe some where it reduces number necessary measurements more than 8 times....

10.46586/tches.v2019.i1.209-237 article EN cc-by IACR Transactions on Cryptographic Hardware and Embedded Systems 2018-11-09

The field of side-channel analysis has made significant progress over time. Side-channel is now used in practice design companies as well test laboratories, and the security products against attacks significantly improved. However, there are still some remaining issues to be solved for become more effective. consists two steps, commonly referred identification exploitation. understanding leakage building suitable models. exploitation using identified models extract secret key. In scenarios...

10.1109/ijcnn.2017.7966373 article EN 2022 International Joint Conference on Neural Networks (IJCNN) 2017-05-01

Profiled side-channel analysis based on deep learning, and more precisely Convolutional Neural Networks, is a paradigm showing significant potential. The results, although scarce for now, suggest that such techniques are even able to break cryptographic implementations protected with countermeasures. In this paper, we start by proposing new Network instance reach high performance number of considered datasets. We compare our neural network the one designed particular dataset masking...

10.13154/tches.v2019.i3.148-179 preprint EN other-oa HAL (Le Centre pour la Communication Scientifique Directe) 2019-05-09

Abstract The prediction and design of photonic features have traditionally been guided by theory-driven computational methods, spanning a wide range direct solvers optimization techniques. Motivated enormous advances in the field machine learning, there has recently growing interest developing complementary data-driven methods for photonics. Here, we demonstrate several predictive generative approaches characterization inverse crystals. Concretely, built data set 20,000 two-dimensional...

10.1515/nanoph-2020-0197 article EN cc-by Nanophotonics 2020-06-29

Today, the deep learning-based side-channel analysis represents a widely researched topic, with numerous results indicating advantages of such an approach. Indeed, breaking protected implementations while not requiring complex feature selection made learning preferred option for profiling analysis. Still, this does mean it is trivial to mount successful One biggest challenges find optimal hyperparameters neural networks resulting in powerful attacks. This work proposes automated way...

10.1109/tetc.2022.3218372 article EN IEEE Transactions on Emerging Topics in Computing 2022-11-07

One of the main promoted advantages deep learning in profiling sidechannel analysis is possibility skipping feature engineering process. Despite that, most recent publications consider selection as attacked interval from side-channel measurements pre-selected. This similar to worst-case security assumptions evaluations when random secret shares (e.g., mask shares) are known during phase: an evaluator can identify points ofinterest locations and efficiently trim trace interval. To broadly...

10.46586/tches.v2022.i4.828-861 article EN cc-by IACR Transactions on Cryptographic Hardware and Embedded Systems 2022-08-31

Profiled side-channel attacks represent a practical threat to digital devices, thereby having the potential disrupt foundation of e-commerce, Internet Things (IoT), and smart cities.In profiled attack, adversary gains knowledge about target device by getting access cloned device.Though these two devices are different in realworld scenarios, yet, unfortunately, large part research works simplifies setting using only single for both profiling attacking.There, portability issue is conveniently...

10.14722/ndss.2020.24390 preprint EN 2020-01-01

Substitution Boxes (S-Boxes) play an important role in many modern-day cryptographic algorithms, more commonly known as ciphers. Without carefully chosen S-Boxes, such ciphers would be easier to break. Therefore, it is not surprising that the design of suitable S-Boxes attracts a lot attention cryptography community. The evolutionary computation (EC) community also had several attempts using paradigms evolve with good properties. This article focuses on fitness function one should use when...

10.1162/evco_a_00191 article EN Evolutionary Computation 2016-08-02

The adoption of deep neural networks for profiled side-channel attacks provides powerful options leakage detection and key retrieval secure products. When training a network analysis, it is expected that the trained model can implement an approximation function detect leaking samples and, at same time, be insensible to noisy (or non-leaking) samples. This outlines generalization situation where identify main representations learned from set in separate test set.This paper discusses how...

10.46586/tches.v2020.i4.337-364 article EN cc-by IACR Transactions on Cryptographic Hardware and Embedded Systems 2020-08-26

Backdoor attacks represent a serious threat to neural network models. A backdoored model will misclassify the trigger-embedded inputs into an attacker-chosen target label while performing normally on other benign inputs. There are already numerous works backdoor networks, but only few consider graph networks (GNNs). As such, there is no intensive research explaining impact of trigger injecting position performance GNNs.

10.1145/3468218.3469046 article EN 2021-06-21

In the last decade, machine learning-based side-channel attacks have become a standard option when investigating profiling attacks. At same time, previous state-of-the-art technique, template attack, started losing its importance and was more considered baseline to compare against. As such, most of results reported that learning (and especially deep learning) could significantly outperform attack. Nevertheless, attack still has certain advantages even compared learning. The significant one...

10.46586/tches.v2022.i3.413-437 article EN cc-by IACR Transactions on Cryptographic Hardware and Embedded Systems 2022-06-08

This work explores stylistic triggers for backdoor attacks in the audio domain: dynamic transformations of malicious samples through guitar effects. We first formalize – currently missing literature. Second, we explore how to develop domain by proposing JingleBack. Our experiments confirm effectiveness attack, achieving a 96% attack success rate. code is available https://github.com/skoffas/going-in-style.

10.1109/icassp49357.2023.10096332 article EN ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) 2023-05-05

Large Language Models (LLMS) have increasingly become central to generating content with potential societal impacts. Notably, these models demonstrated capabilities for that could be deemed harmful. To mitigate risks, researchers adopted safety training techniques align model outputs values curb the generation of malicious content. However, phenomenon "jailbreaking", where carefully crafted prompts elicit harmful responses from models, persists as a significant challenge. This research...

10.48550/arxiv.2402.13457 preprint EN arXiv (Cornell University) 2024-02-20

10.1007/s12095-018-0311-8 article EN Cryptography and Communications 2018-05-21

10.1007/s13389-017-0172-7 article EN Journal of Cryptographic Engineering 2017-09-22

In the profiled side-channel analysis, deep learning-based techniques proved to be very successful even when attacking targets protected with countermeasures. Still, there is no guarantee that learning attacks will always succeed. Various countermeasures make significantly more complex, and such can further combined challenging. An intuitive solution improve performance of would reduce effect countermeasures.This paper investigates whether we consider certain types hiding as noise then use a...

10.46586/tches.v2020.i4.389-415 article EN cc-by IACR Transactions on Cryptographic Hardware and Embedded Systems 2020-08-26

This work explores backdoor attacks for automatic speech recognition systems where we inject inaudible triggers. By doing so, make the attack challenging to detect legitimate users, and thus, potentially more dangerous. We conduct experiments on two versions of a dataset three neural networks explore performance our concerning duration, position, type trigger. Our results indicate that less than 1% poisoned data is sufficient deploy reach 100% success rate. observed short, non-continuous...

10.1145/3522783.3529523 preprint EN 2022-05-09

Abstract Deep learning is a powerful direction for profiling side-channel analysis as it can break targets protected with countermeasures even relatively small number of attack traces. Still, necessary to conduct hyperparameter tuning reach strong performance, which be far from trivial. Besides many options stemming the machine domain, recent years also brought neural network elements specially designed analysis. The loss function, calculates error or between actual and desired output, one...

10.1007/s13389-023-00320-6 article EN cc-by Journal of Cryptographic Engineering 2023-05-28
Coming Soon ...