If you made any changes in Pure these will be visible here soon.

Research Output

2020

A fast characterization method for semi-invasive fault injection attacks

Wu, L., Ribera, G., Beringuier-Boher, N. & Picek, S., 2020, Topics in Cryptology – CT-RSA 2020 - The Cryptographers Track at the RSA Conference 2020, Proceedings. Jarecki, S. (ed.). Springer Open, p. 146-170 25 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12006 LNCS).

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

Open Access
File
1 Citation (Scopus)
31 Downloads (Pure)

An Evolutionary View on Reversible Shift-Invariant Transformations

Mariot, L., Picek, S., Jakobovic, D. & Leporati, A., 2020, Genetic Programming - 23rd European Conference, EuroGP 2020, Held as Part of EvoStar 2020, Proceedings. Hu, T., Lourenço, N., Medvet, E. & Divina, F. (eds.). Springer Open, p. 118-134 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12101 LNCS).

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

1 Citation (Scopus)

Evolutionary computation and machine learning in cryptology

Picek, S. & Jakobovic, D., 2020, GECCO 2020 Companion : Proceedings of the 2020 Genetic and Evolutionary Computation Conference Companion. New York: Association for Computing Machinery (ACM), p. 1147-1173 27 p.

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

Open Access
File
1 Downloads (Pure)

Lightweight Ciphers and their Side-channel Resilience

Heuser, A., Picek, S., Guilley, S. & Mentens, N., 2020, In : IEEE Transactions on Computers. p. 1-16 16 p.

Research output: Contribution to journalArticleScientificpeer-review

Open Access
File
6 Citations (Scopus)
55 Downloads (Pure)

On the feasibility of using evolvable hardware for hardware Trojan detection and prevention

Labafniya, M., Picek, S., Etemadi Borujeni, S. & Mentens, N., 1 Jun 2020, In : Applied Soft Computing Journal. 91, 11 p., 106247.

Research output: Contribution to journalArticleScientificpeer-review

1 Citation (Scopus)

What Is Your MOVE: Modeling Adversarial Network Environments

Knezevic, K., Picek, S., Jakobovic, D. & Hernandez-Castro, J., 2020, Applications of Evolutionary Computation : 23rd European Conference, EvoApplications 2020, Held as Part of EvoStar 2020, Proceedings. Castillo, P. A., Jiménez Laredo, J. L. & Fernández de Vega, F. (eds.). Cham: Springer, p. 260-275 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12104 ).

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

Open Access
File
18 Downloads (Pure)
2019

A characterisation of S-box fitness landscapes in cryptography

Jakobovic, D., Picek, S., Martins, M. S. R. & Wagner, M., 2019, GECCO'19: Proceedings of the 2019 Genetic and Evolutionary Computation Conference. New York: Association for Computing Machinery (ACM), p. 285-293 9 p.

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

A Systematic Evaluation of Profiling Through Focused Feature Selection

Picek, S., Heuser, A., Jovic, A. & Batina, L., 2019, In : IEEE Transactions on Very Large Scale Integration (VLSI) Systems. 27, 12, p. 2802-2815 14 p., 8836108.

Research output: Contribution to journalArticleScientificpeer-review

Open Access
File
2 Citations (Scopus)
26 Downloads (Pure)

C3PO: Cipher Construction with Cartesian genetic PrOgramming

Picek, S., Knezevic, K., Jakobovic, D. & Derek, A., 2019, GECCO'19 : Proceedings of the 2019 Genetic and Evolutionary Computation Conference Companion. López-Ibáñez, M. (ed.). New York: Association for Computing Machinery (ACM), p. 1625-1633 9 p.

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

Cellular automata based S-boxes

Mariot, L., Picek, S., Leporati, A. & Jakobovic, D., 2019, In : Cryptography and Communications. 11, 1, p. 41-62 22 p.

Research output: Contribution to journalArticleScientificpeer-review

Open Access
File
14 Citations (Scopus)
88 Downloads (Pure)

Challenges in deep learning-based profiled side-channel analysis

Picek, S., 1 Jan 2019, Security, Privacy, and Applied Cryptography Engineering - 9th International Conference, SPACE 2019, Proceedings. Bhasin, S., Mendelson, A. & Nandi, M. (eds.). Springer, p. 9-12 4 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11947 LNCS).

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

1 Citation (Scopus)

CSI NN: Reverse engineering of neural network architectures through electromagnetic side channel

Batina, L., Jap, D., Bhasin, S. & Picek, S., 2019, Proceedings of the 28th USENIX Security Symposium. USENIX Association, p. 515-532 18 p.

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

Open Access
File
22 Downloads (Pure)

Evolutionary algorithms for the design of quantum protocols

Krawec, W., Picek, S. & Jakobovic, D., 2019, Applications of Evolutionary Computation: 22nd International Conference, EvoApplications 2019, Held as Part of EvoStar 2019. Kaufmann, P. & Castillo, P. A. (eds.). Cham: Springer, p. 220-236 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11454 LNCS).

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

1 Citation (Scopus)

Hyper-bent Boolean Functions and Evolutionary Algorithms

Mariot, L., Jakobovic, D., Leporati, A. & Picek, S., 2019, Genetic Programming : 22nd European Conference, EuroGP 2019, Held as Part of EvoStar 2019, Proceedings. Sekanina, L., Hu, T., Richter, H., García-Sánchez, P. & Lourenço, N. (eds.). Cham: Springer, p. 262-277 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11451 LNCS).

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

2 Citations (Scopus)

Improving Side-Channel Analysis Through Semi-Supervised Learning

Picek, S., Heuser, A., Jovic, A., Knezevic, K. & Richmond, T., 2019, Smart Card Research and Advanced Applications : 17th International Conference, CARDIS 2018, Revised Selected Papers. Bilgin, B. & Fischer, J-B. (eds.). Cham: Springer, p. 35-50 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11389).

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

Make Some Noise: Unleashing the Power of Convolutional Neural Networks for Profiled Side-channel Analysis

Kim, J. H., Picek, S., Heuser, A., Bhasin, S. & Hanjalic, A., 2019, In : IACR Transactions on Cryptographic Hardware and Embedded Systems. 2019, 3, p. 148-179 27 p.

Research output: Contribution to journalArticleScientificpeer-review

Open Access
File
11 Downloads (Pure)

One trace is all it takes: machine learning-based side-channel attack on EDDSA

Weissbart, L., Picek, S. & Batina, L., 2019, Security, Privacy, and Applied Cryptography Engineering - 9th International Conference, SPACE 2019, Proceedings. Bhasin, S., Mendelson, A. & Nandi, M. (eds.). Springer, p. 86-105 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11947 LNCS).

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

1 Citation (Scopus)

On the design of S-box constructions with genetic programming

Picek, S. & Jakobovic, D., 2019, GECCO'19 : Proceedings of the 2019 Genetic and Evolutionary Computation Conference Companion. López-Ibáñez, M. (ed.). New York: Association for Computing Machinery (ACM), p. 395-396 2 p.

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

Poster: When adversary becomes the guardian - Towards side-channel security with adversarial attacks

Picek, S., Jap, D. & Bhasin, S., 2019, CCS '19: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. New York: Association for Computing Machinery (ACM), p. 2673-2675 3 p.

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

Poster: Recovering the input of neural networks via single shot side-channel attacks

Batina, L., Bhasin, S., Jap, D. & Picek, S., 2019, CCS '19: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. New York: Association for Computing Machinery (ACM), p. 2657-2659 3 p.

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

2018

A Search for Differentially-6 Uniform (n, n-2) Functions

Picek, S., Knezevic, K., Jakobovic, D. & Carlet, C., 2018, 2018 IEEE Congress on Evolutionary Computation (CEC): Proceedings. Piscataway, NJ: IEEE, p. 1-7 7 p. 8477646

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

Classification of cancer data: Analyzing gene expression data using a fuzzy decision tree algorithm

Picek, S., Ludwig, S. A. & Jakobovic, D., 2018, Operations Research Applications in Health Care Management. Kahraman, C. & Ilker Topcu, Y. (eds.). Cham: Springer, p. 327-347 21 p. (International Series in Operations Research and Management Science; vol. 262).

Research output: Chapter in Book/Conference proceedings/Edited volumeChapterScientific

18 Citations (Scopus)

Evolutionary search of binary orthogonal arrays

Mariot, L., Picek, S., Jakobovic, D. & Leporati, A., 2018, Parallel Problem Solving from Nature – PPSN XV - 15th International Conference, 2018, Proceedings. Auger, A., Fonseca, C. M., Lourenço, N., Machado, P., Paquete, L. & Whitley, D. (eds.). 1 ed. Cham: Springer, p. 121-133 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11101 ).

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

5 Citations (Scopus)

Evolving Bent Quaternary Functions

Picek, S., Knezevic, K., Mariot, L., Jakobovic, D. & Leporati, A., 2018, 2018 IEEE Congress on Evolutionary Computation (CEC): Proceedings. Piscataway, NJ: IEEE, p. 1-8 8 p. 8477677

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

1 Citation (Scopus)

Finding short and implementation-friendly addition chains with evolutionary algorithms

Picek, S., Coello Coello, C. A., Jakobovic, D. & Mentens, N., 2018, In : Journal of Heuristics. 24, 3, p. 457-481 25 p.

Research output: Contribution to journalArticleScientificpeer-review

2 Citations (Scopus)

Genetic Algorithm-Based Electromagnetic Fault Injection

Maldini, A., Samwel, N., Picek, S. & Batina, L., 2018, 2018 Workshop on Fault Diagnosis and Tolerance in Cryptography FDTC : Proceedings. Guerrero, J. E. (ed.). Piscataway, NJ: IEEE, p. 35-42 8 p. 8573932

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

2 Citations (Scopus)

Higher order side-channel attack resilient S-boxes

Lerman, L., Veshchikov, N., Picek, S. & Markowitch, O., 2018, 2018 ACM International Conference on Computing Frontiers, CF 2018 - Proceedings. Kaeli, D. R. & Pericàs, M. (eds.). New York: Association for Computing Machinery (ACM), p. 336-341 6 p.

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

1 Citation (Scopus)

Lightweight and Side-channel Secure 4 × 4 S-Boxes from Cellular Automata Rules

Ghoshal, A., Sadhukhan, R., Patranabis, S., Datta, N., Picek, S. & Mukhopadhyay, D., 2018, In : IACR Transactions on Symmetric Cryptology . 2018, 3, p. 311-334 24 p.

Research output: Contribution to journalArticleScientificpeer-review

Open Access
File
5 Citations (Scopus)
44 Downloads (Pure)

On Comparing Side-channel Properties of AES and ChaCha20 on Microcontrollers

Najm, Z., Jap, D., Jungk, B., Picek, S. & Bhasin, S., 2018, 2018 IEEE Asia Pacific Conference on Circuits and Systems (APCCAS). Piscataway, NJ: IEEE, p. 552-555 4 p.

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

2 Citations (Scopus)

On the Performance of Convolutional Neural Networks for Side-Channel Analysis

Picek, S., Samiotis, I. P., Kim, J., Heuser, A., Bhasin, S. & Legay, A., 2018, Security, Privacy, and Applied Cryptography Engineering: 8th International Conference, SPACE 2018, Kanpur, India, December 15-19, 2018, Proceedings. Chattopadhyay, A., Rebeiro, C. & Yarom, Y. (eds.). Cham: Springer, p. 157-176 20 p. (Lecture Notes in Computer Science; vol. 11348).

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

15 Citations (Scopus)

The Curse of Class Imbalance and Conflicting Metrics with Machine Learning for Side-channel Evaluations

Picek, S., Heuser, A., Jovic, A., Bhasin, S. & Regazzoni, F., 2018, In : IACR Transactions on Cryptographic Hardware and Embedded Systems. 2019, 1, p. 209-237 29 p.

Research output: Contribution to journalArticleScientificpeer-review

Open Access
File
36 Downloads (Pure)

The Design of (Almost) Disjunct Matrices by Evolutionary Algorithms

Knezevic, K., Picek, S., Mariot, L., Jakobovic, D. & Leporati, A., 2018, Theory and Practice of Natural Computing: 7th International Conference, TPNC 2018, Dublin, Ireland, December 12–14, 2018, Proceedings. Fagan, D., Martín-Vide, C., O'Neill, M. & Vega-Rodríguez, M. A. (eds.). Cham: Springer, p. 152-163 12 p. (Lecture Notes in Computer Science ; vol. 11324).

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

Tutorials at PPSN 2018

Lobo Pappa, G., Emmerich, M. T. M., Bazzan, A., Browne, W., Deb, K., Doerr, C., Ðurasević, M., Epitropakis, M. G., Haraldsson, S. O., Picek, S. & More Authors, 2018, Parallel Problem Solving from Nature – PPSN XV - 15th International Conference, 2018, Proceedings. Auger, A., Fonseca, C. M., Lourenço, N., Machado, P., Paquete, L. & Whitley, D. (eds.). 2 ed. Cham: Springer, p. 477-489 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11102).

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

2017

Automatic Feature Construction for Network Intrusion Detection

Tran, B., Picek, S. & Xue, B., 2017, Simulated Evolution and Learning : 11th International Conference SEAL 2017 Proceedings. Shi, Y., Tan, K. C., Zhang, M., Tang, K., Li, X., Zhang, Q., Tan, Y., Middendorf, M. & Jin, Y. (eds.). Cham: Springer, p. 569-580 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10593 ).

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

2 Citations (Scopus)

Evolutionary algorithms for the design of orthogonal Latin squares based on cellular automata

Mariot, L., Picek, S., Jakobovic, D. & Leporati, A., 2017, GECCO'17 Proceedings of the Genetic and Evolutionary Computation Conference. New York, NY: Association for Computing Machinery (ACM), p. 306-313 8 p.

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

7 Citations (Scopus)

Evolutionary Computation and Cryptology

Picek, S., 2017, GECCO 2017 - Proceedings of the Genetic and Evolutionary Computation Conference Companion. New York, NY: Association for Computing Machinery (ACM), p. 1066-1093 28 p.

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

1 Citation (Scopus)

If You Can't Measure It, You Can't Improve It: Moving Target Defense Metrics

Picek, S., Hemberg, E. & O'Reilly, U-M., 2017, MTD'17 Proceedings of the 2017 Workshop on Moving Target Defense . New York, NY: Association for Computing Machinery (ACM), p. 115-118 4 p.

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

1 Citation (Scopus)

Trade-Offs for S-boxes: Cryptographic Properties and Side-Channel Resilience

Carlet, C., Heuser, A. & Picek, S., 2017, Applied Cryptography and Network Security : 15th International Conference, ACNS 2017, Proceedings. Gollmann, D., Miyaji, A. & Kikuchi, H. (eds.). Cham: Springer, p. 393-414 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10355 ).

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

2 Citations (Scopus)