default search action
Dirmanto Jap
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j20]Prasanna Ravi, Thales Paiva, Dirmanto Jap, Jan-Pieter D'Anvers, Shivam Bhasin:
Defeating Low-Cost Countermeasures against Side-Channel Attacks in Lattice-based Encryption A Case Study on Crystals-Kyber. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(2): 795-818 (2024) - [j19]Lichao Wu, Yoo-Seung Won, Dirmanto Jap, Guilherme Perin, Shivam Bhasin, Stjepan Picek:
Ablation Analysis for Multi-Device Deep Learning-Based Physical Side-Channel Analysis. IEEE Trans. Dependable Secur. Comput. 21(3): 1331-1341 (2024) - [c35]Trevor Yap, Dirmanto Jap:
Creating from Noise: Trace Generations Using Diffusion Model for Side-Channel Attack. ACNS Workshops (1) 2024: 102-120 - [i26]Dirmanto Jap, Jakub Breier, Zdenko Lehocký, Shivam Bhasin, Xiaolu Hou:
Side-Channel Analysis of OpenVINO-based Neural Network Models. CoRR abs/2407.16467 (2024) - [i25]Trevor Yap, Dirmanto Jap:
Creating from Noise: Trace Generations Using Diffusion Model for Side-Channel Attack. IACR Cryptol. ePrint Arch. 2024: 167 (2024) - [i24]Prasanna Ravi, Dirmanto Jap, Shivam Bhasin, Anupam Chattopadhyay:
Machine Learning based Blind Side-Channel Attacks on PQC-based KEMs - A Case Study of Kyber KEM. IACR Cryptol. ePrint Arch. 2024: 169 (2024) - [i23]Shivam Bhasin, Harishma Boyapally, Dirmanto Jap:
Reality Check on Side-Channels: Lessons learnt from breaking AES on an ARM Cortex A processor. IACR Cryptol. ePrint Arch. 2024: 1381 (2024) - 2023
- [j18]Anubhab Baksi, Shivam Bhasin, Jakub Breier, Dirmanto Jap, Dhiman Saha:
A Survey on Fault Attacks on Symmetric Key Cryptosystems. ACM Comput. Surv. 55(4): 86:1-86:34 (2023) - [c34]Dirmanto Jap, Shivam Bhasin:
Using Model Optimization as Countermeasure against Model Recovery Attacks. ACNS Workshops 2023: 196-209 - [c33]Jakub Breier, Dirmanto Jap, Xiaolu Hou, Shivam Bhasin:
A Desynchronization-Based Countermeasure Against Side-Channel Analysis of Neural Networks. CSCML 2023: 296-306 - [c32]Sayandeep Saha, Prasanna Ravi, Dirmanto Jap, Shivam Bhasin:
Non-Profiled Side-Channel Assisted Fault Attack: A Case Study on DOMREP. DATE 2023: 1-6 - [c31]Prasanna Ravi, Dirmanto Jap, Shivam Bhasin, Anupam Chattopadhyay:
Invited Paper: Machine Learning Based Blind Side-Channel Attacks on PQC-Based KEMs - A Case Study of Kyber KEM. ICCAD 2023: 1-7 - [i22]Jakub Breier, Dirmanto Jap, Xiaolu Hou, Shivam Bhasin:
A Desynchronization-Based Countermeasure Against Side-Channel Analysis of Neural Networks. CoRR abs/2303.18132 (2023) - [i21]Thales Paiva, Prasanna Ravi, Dirmanto Jap, Shivam Bhasin:
Et tu, Brute? SCA Assisted CCA using Valid Ciphertexts - A Case Study on HQC KEM. IACR Cryptol. ePrint Arch. 2023: 1626 (2023) - [i20]Prasanna Ravi, Thales Paiva, Dirmanto Jap, Jan-Pieter D'Anvers, Shivam Bhasin:
Defeating Low-Cost Countermeasures against Side-Channel Attacks in Lattice-based Encryption - A Case Study on Crystals-Kyber. IACR Cryptol. ePrint Arch. 2023: 1627 (2023) - 2022
- [j17]Lejla Batina, Shivam Bhasin, Dirmanto Jap, Stjepan Picek:
SCA Strikes Back: Reverse-Engineering Neural Network Architectures Using Side Channels. IEEE Des. Test 39(4): 7-14 (2022) - [j16]Satyam Kumar, Vishnu Asutosh Dasu, Anubhab Baksi, Santanu Sarkar, Dirmanto Jap, Jakub Breier, Shivam Bhasin:
Side Channel Attack On Stream Ciphers: A Three-Step Approach To State/Key Recovery. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(2): 166-191 (2022) - [j15]Jakub Breier, Dirmanto Jap, Xiaolu Hou, Shivam Bhasin, Yang Liu:
SNIFF: Reverse Engineering of Neural Networks With Fault Attacks. IEEE Trans. Reliab. 71(4): 1527-1539 (2022) - [p2]Alan Jovic, Dirmanto Jap, Louiza Papachristodoulou, Annelie Heuser:
Traditional Machine Learning Methods for Side-Channel Analysis. Security and Artificial Intelligence 2022: 25-47 - [p1]Lejla Batina, Shivam Bhasin, Jakub Breier, Xiaolu Hou, Dirmanto Jap:
On Implementation-Level Security of Edge-Based Machine Learning Models. Security and Artificial Intelligence 2022: 335-359 - [i19]Shivam Bhasin, Dirmanto Jap, Wei Cheng Ng, Siang Meng Sim:
Survey on the Effectiveness of DAPA-Related Attacks against Shift Register Based AEAD Schemes. IACR Cryptol. ePrint Arch. 2022: 561 (2022) - 2021
- [j14]Yoo-Seung Won, Dong-Guk Han, Dirmanto Jap, Shivam Bhasin, Jong-Yeon Park:
Non-Profiled Side-Channel Attack Based on Deep Learning Using Picture Trace. IEEE Access 9: 22480-22492 (2021) - [j13]Siang Meng Sim, Dirmanto Jap, Shivam Bhasin:
DAPA: Differential Analysis aided Power Attack on (Non-) Linear Feedback Shift Registers. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(1): 169-191 (2021) - [j12]Yoo-Seung Won, Xiaolu Hou, Dirmanto Jap, Jakub Breier, Shivam Bhasin:
Back to the Basics: Seamless Integration of Side-Channel Pre-Processing in Deep Neural Networks. IEEE Trans. Inf. Forensics Secur. 16: 3215-3227 (2021) - [c30]Sayandeep Saha, Arnab Bag, Dirmanto Jap, Debdeep Mukhopadhyay, Shivam Bhasin:
Divided We Stand, United We Fall: Security Analysis of Some SCA+SIFA Countermeasures Against SCA-Enhanced Fault Template Attacks. ASIACRYPT (2) 2021: 62-94 - [c29]Yoo-Seung Won, Soham Chatterjee, Dirmanto Jap, Arindam Basu, Shivam Bhasin:
WaC: First Results on Practical Side-Channel Attacks on Commercial Machine Learning Accelerator. ASHES@CCS 2021: 111-114 - [c28]Dirmanto Jap, Yoo-Seung Won, Shivam Bhasin:
Fault injection attacks on SoftMax function in deep neural networks. CF 2021: 238-240 - [c27]Yoo-Seung Won, Soham Chatterjee, Dirmanto Jap, Shivam Bhasin, Arindam Basu:
Time to Leak: Cross-Device Timing Attack On Edge Deep Learning Accelerator. ICEIC 2021: 1-4 - [c26]Yoo-Seung Won, Soham Chatterjee, Dirmanto Jap, Arindam Basu, Shivam Bhasin:
DeepFreeze: Cold Boot Attacks and High Fidelity Model Recovery on Commercial EdgeML Device. ICCAD 2021: 1-9 - [c25]Ville Yli-Mäyry, Akira Ito, Naofumi Homma, Shivam Bhasin, Dirmanto Jap:
Extraction of Binarized Neural Network Architecture and Secret Parameters Using Side-Channel Information. ISCAS 2021: 1-5 - [i18]Yoo-Seung Won, Soham Chatterjee, Dirmanto Jap, Arindam Basu, Shivam Bhasin:
DeepFreeze: Cold Boot Attacks and High Fidelity Model Recovery on Commercial EdgeML Device. CoRR abs/2108.01281 (2021) - [i17]Lichao Wu, Yoo-Seung Won, Dirmanto Jap, Guilherme Perin, Shivam Bhasin, Stjepan Picek:
Explain Some Noise: Ablation Analysis for Deep Learning-based Physical Side-channel Analysis. IACR Cryptol. ePrint Arch. 2021: 717 (2021) - 2020
- [j11]Manaar Alam, Arnab Bag, Debapriya Basu Roy, Dirmanto Jap, Jakub Breier, Shivam Bhasin, Debdeep Mukhopadhyay:
Neural Network-based Inherently Fault-tolerant Hardware Cryptographic Primitives without Explicit Redundancy Checks. ACM J. Emerg. Technol. Comput. Syst. 17(1): 3:1-3:30 (2020) - [j10]Shivam Bhasin, Jakub Breier, Xiaolu Hou, Dirmanto Jap, Romain Poussier, Siang Meng Sim:
SITM: See-In-The-Middle Side-Channel Assisted Middle Round Differential Cryptanalysis on SPN Block Ciphers. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(1): 95-122 (2020) - [j9]Jakub Breier, Dirmanto Jap, Xiaolu Hou, Shivam Bhasin:
On Side Channel Vulnerabilities of Bit Permutations in Cryptographic Algorithms. IEEE Trans. Inf. Forensics Secur. 15: 1072-1085 (2020) - [j8]Sayandeep Saha, Dirmanto Jap, Debapriya Basu Roy, Avik Chakraborty, Shivam Bhasin, Debdeep Mukhopadhyay:
A Framework to Counter Statistical Ineffective Fault Analysis of Block Ciphers Using Domain Transformation and Error Correction. IEEE Trans. Inf. Forensics Secur. 15: 1905-1919 (2020) - [c24]Dirmanto Jap, Ville Yli-Mäyry, Akira Ito, Rei Ueno, Shivam Bhasin, Naofumi Homma:
Practical Side-Channel Based Model Extraction Attack on Tree-Based Machine Learning Algorithm. ACNS Workshops 2020: 93-105 - [c23]Francesco Regazzoni, Shivam Bhasin, Amir Alipour, Ihab Alshaer, Furkan Aydin, Aydin Aysu, Vincent Beroulle, Giorgio Di Natale, Paul D. Franzon, David Hély, Naofumi Homma, Akira Ito, Dirmanto Jap, Priyank Kashyap, Ilia Polian, Seetal Potluri, Rei Ueno, Elena-Ioana Vatajelu, Ville Yli-Mäyry:
Machine Learning and Hardware security: Challenges and Opportunities -Invited Talk-. ICCAD 2020: 141:1-141:6 - [c22]Dirmanto Jap, Shivam Bhasin:
Practical Reverse Engineering of Secret Sboxes by Side-Channel Analysis. ISCAS 2020: 1-5 - [c21]Shivam Bhasin, Anupam Chattopadhyay, Annelie Heuser, Dirmanto Jap, Stjepan Picek, Ritu Ranjan Shrivastwa:
Mind the Portability: A Warriors Guide through Realistic Profiled Side-channel Analysis. NDSS 2020 - [c20]Yoo-Seung Won, Dirmanto Jap, Shivam Bhasin:
Push for More: On Comparison of Data Augmentation and SMOTE with Optimised Deep Learning Architecture for Side-Channel. WISA 2020: 227-241 - [i16]Jakub Breier, Dirmanto Jap, Xiaolu Hou, Shivam Bhasin, Yang Liu:
SNIFF: Reverse Engineering of Neural Networks with Fault Attacks. CoRR abs/2002.11021 (2020) - [i15]Shivam Bhasin, Jakub Breier, Xiaolu Hou, Dirmanto Jap, Romain Poussier, Siang Meng Sim:
SITM: See-In-The-Middle-Side-Channel Assisted Middle Round Differential Cryptanalysis on SPN Block Ciphers. IACR Cryptol. ePrint Arch. 2020: 210 (2020) - [i14]Yoo-Seung Won, Dirmanto Jap, Shivam Bhasin:
Push For More: On Comparison of Data Augmentation and SMOTE With Optimised Deep Learning Architecture For Side-Channel. IACR Cryptol. ePrint Arch. 2020: 655 (2020) - [i13]Yoo-Seung Won, Xiaolu Hou, Dirmanto Jap, Jakub Breier, Shivam Bhasin:
Back To The Basics: Seamless Integration of Side-Channel Pre-processing in Deep Neural Networks. IACR Cryptol. ePrint Arch. 2020: 1134 (2020) - [i12]Siang Meng Sim, Dirmanto Jap, Shivam Bhasin:
DAPA: Differential Analysis aided Power Attack on (Non-)Linear Feedback Shift Registers (Extended version). IACR Cryptol. ePrint Arch. 2020: 1241 (2020) - [i11]Anubhab Baksi, Shivam Bhasin, Jakub Breier, Dirmanto Jap, Dhiman Saha:
Fault Attacks In Symmetric Key Cryptosystems. IACR Cryptol. ePrint Arch. 2020: 1267 (2020)
2010 – 2019
- 2019
- [j7]Sikhar Patranabis, Nilanjan Datta, Dirmanto Jap, Jakub Breier, Shivam Bhasin, Debdeep Mukhopadhyay:
SCADFA: Combined SCA+DFA Attacks on Block Ciphers with Practical Validations. IEEE Trans. Computers 68(10): 1498-1510 (2019) - [j6]Sayandeep Saha, Dirmanto Jap, Sikhar Patranabis, Debdeep Mukhopadhyay, Shivam Bhasin, Pallab Dasgupta:
Automatic Characterization of Exploitable Faults: A Machine Learning Approach. IEEE Trans. Inf. Forensics Secur. 14(4): 954-968 (2019) - [c19]Lejla Batina, Shivam Bhasin, Dirmanto Jap, Stjepan Picek:
Poster: Recovering the Input of Neural Networks via Single Shot Side-channel Attacks. CCS 2019: 2657-2659 - [c18]Stjepan Picek, Dirmanto Jap, Shivam Bhasin:
Poster: When Adversary Becomes the Guardian - Towards Side-channel Security With Adversarial Attacks. CCS 2019: 2673-2675 - [c17]Lejla Batina, Shivam Bhasin, Dirmanto Jap, Stjepan Picek:
CSI NN: Reverse Engineering of Neural Network Architectures Through Electromagnetic Side Channel. USENIX Security Symposium 2019: 515-532 - [i10]Manaar Alam, Arnab Bag, Debapriya Basu Roy, Dirmanto Jap, Jakub Breier, Shivam Bhasin, Debdeep Mukhopadhyay:
Enhancing Fault Tolerance of Neural Networks for Security-Critical Applications. CoRR abs/1902.04560 (2019) - [i9]Xiaolu Hou, Jakub Breier, Dirmanto Jap, Lei Ma, Shivam Bhasin, Yang Liu:
Experimental Evaluation of Deep Neural Network Resistance Against Fault Injection Attacks. IACR Cryptol. ePrint Arch. 2019: 461 (2019) - [i8]Shivam Bhasin, Anupam Chattopadhyay, Annelie Heuser, Dirmanto Jap, Stjepan Picek, Ritu Ranjan Shrivastwa:
Mind the Portability: A Warriors Guide through Realistic Profiled Side-channel Analysis. IACR Cryptol. ePrint Arch. 2019: 661 (2019) - 2018
- [j5]Anupam Chattopadhyay, Abhisek Ukil, Dirmanto Jap, Shivam Bhasin:
Toward Threat of Implementation Attacks on Substation Security: Case Study on Fault Detection and Isolation. IEEE Trans. Ind. Informatics 14(6): 2442-2451 (2018) - [c16]Zakaria Najm, Dirmanto Jap, Bernhard Jungk, Stjepan Picek, Shivam Bhasin:
On Comparing Side-channel Properties of AES and ChaCha20 on Microcontrollers. APCCAS 2018: 552-555 - [c15]Jakub Breier, Xiaolu Hou, Dirmanto Jap, Lei Ma, Shivam Bhasin, Yang Liu:
Practical Fault Attack on Deep Neural Networks. CCS 2018: 2204-2206 - [c14]Jakub Breier, Dirmanto Jap, Shivam Bhasin:
SCADPA: Side-channel assisted differential-plaintext attack on bit permutation based ciphers. DATE 2018: 1129-1134 - [c13]Sayandeep Saha, Dirmanto Jap, Jakub Breier, Shivam Bhasin, Debdeep Mukhopadhyay, Pallab Dasgupta:
Breaking Redundancy-Based Countermeasures with Random Faults and Power Side Channel. FDTC 2018: 15-22 - [c12]Prasanna Ravi, Bernhard Jungk, Dirmanto Jap, Zakaria Najm, Shivam Bhasin:
Feature Selection Methods for Non-Profiled Side-Channel Attacks on ECC. DSP 2018: 1-5 - [i7]Jakub Breier, Xiaolu Hou, Dirmanto Jap, Lei Ma, Shivam Bhasin, Yang Liu:
Practical Fault Attack on Deep Neural Networks. CoRR abs/1806.05859 (2018) - [i6]Lejla Batina, Shivam Bhasin, Dirmanto Jap, Stjepan Picek:
CSI Neural Network: Using Side-channels to Recover Your Artificial Neural Network Information. CoRR abs/1810.09076 (2018) - [i5]Jakub Breier, Dirmanto Jap, Xiaolu Hou, Shivam Bhasin:
On Side-Channel Vulnerabilities of Bit Permutations: Key Recovery and Reverse Engineering. IACR Cryptol. ePrint Arch. 2018: 219 (2018) - [i4]Lejla Batina, Shivam Bhasin, Dirmanto Jap, Stjepan Picek:
CSI Neural Network: Using Side-channels to Recover Your Artificial Neural Network Information. IACR Cryptol. ePrint Arch. 2018: 477 (2018) - 2017
- [j4]Jakub Breier, Dirmanto Jap, Shivam Bhasin:
A study on analyzing side-channel resistant encoding schemes with respect to fault attacks. J. Cryptogr. Eng. 7(4): 311-320 (2017) - [j3]Jakub Breier, Wei He, Shivam Bhasin, Dirmanto Jap, Samuel Chef, Hock Guan Ong, Chee Lip Gan:
Extensive Laser Fault Injection Profiling of 65 nm FPGA. J. Hardw. Syst. Secur. 1(3): 237-251 (2017) - [j2]Jakub Breier, Wei He, Dirmanto Jap, Shivam Bhasin, Anupam Chattopadhyay:
Attacks in Reality: the Limits of Concurrent Error Detection Codes Against Laser Fault Injection. J. Hardw. Syst. Secur. 1(4): 298-310 (2017) - [j1]Shivam Bhasin, Dirmanto Jap, Thomas Peyrin:
Practical Evaluation of FSE 2016 Customized Encoding Countermeasure. IACR Trans. Symmetric Cryptol. 2017(3): 108-129 (2017) - [i3]Sayandeep Saha, Dirmanto Jap, Sikhar Patranabis, Debdeep Mukhopadhyay, Shivam Bhasin, Pallab Dasgupta:
Automatic Characterization of Exploitable Faults: A Machine Learning Approach. IACR Cryptol. ePrint Arch. 2017: 1008 (2017) - [i2]Jakub Breier, Dirmanto Jap, Shivam Bhasin:
SCADPA: Side-Channel Assisted Differential-Plaintext Attack on Bit Permutation Based Ciphers. IACR Cryptol. ePrint Arch. 2017: 1166 (2017) - 2016
- [c11]Dirmanto Jap, Wei He, Shivam Bhasin:
Supervised and unsupervised machine learning for side-channel based Trojan detection. ASAP 2016: 17-24 - [c10]Jakub Breier, Dirmanto Jap, Shivam Bhasin:
The other side of the coin: Analyzing software encoding schemes against fault injection attacks. HOST 2016: 209-216 - [c9]Wei He, Jakub Breier, Shivam Bhasin, Dirmanto Jap, Hock Guan Ong, Chee Lip Gan:
Comprehensive Laser Sensitivity Profiling and Data Register Bit-Flips for Cryptographic Fault Attacks in 65 Nm FPGA. SPACE 2016: 47-65 - [i1]Jakub Breier, Dirmanto Jap, Shivam Bhasin:
Mistakes Are Proof That You Are Trying: On Verifying Software Encoding Schemes' Resistance to Fault Injection Attacks. IACR Cryptol. ePrint Arch. 2016: 932 (2016) - 2015
- [c8]Wei He, Dirmanto Jap:
Dual-rail active protection system against side-channel analysis in FPGAs. ASAP 2015: 64-65 - [c7]Jakub Breier, Dirmanto Jap, Chien-Ning Chen:
Laser Profiling for the Back-Side Fault Attacks: With a Practical Laser Skip Instruction Attack on AES. CPSS@ASIACSS 2015: 99-103 - [c6]Jakub Breier, Dirmanto Jap:
Testing Feasibility of Back-Side Laser Fault Injection on a Microcontroller. WESS 2015: 5 - [c5]Dirmanto Jap, Jakub Breier:
Differential Fault Attack on LEA. ICT-EurAsia/CONFENIS 2015: 265-274 - [c4]Dirmanto Jap, Marc Stöttinger, Shivam Bhasin:
Support vector regression: exploiting machine learning techniques for leakage modeling. HASP@ISCA 2015: 2:1-2:8 - [c3]Wei He, Dirmanto Jap, Alexander Herrmann:
Process Variation Evaluation Using RO PUF for Enhancing SCA-Resistant Dual-Rail Implementation. WISA 2015: 16-27 - 2014
- [c2]Dirmanto Jap, Jakub Breier:
Overview of machine learning based side-channel analysis methods. ISIC 2014: 38-41 - [c1]Jakub Breier, Dirmanto Jap:
A survey of the state-of-the-art fault attacks. ISIC 2014: 152-155
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-11 21:28 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint