Annelie Heuser

Orcid: 0000-0002-1095-5420

According to our database1, Annelie Heuser authored at least 63 papers between 2011 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Tipping the Balance: Imbalanced Classes in Deep-Learning Side-Channel Analysis.
IEEE Des. Test, 2024

2023
When Side-channel Meets Malware (short paper).
Proceedings of the 30th Computer & Electronics Security Application Rendezvous Conference (C&ESAR 2023) co-located with the 8th European Cyber Week (ECW 2023), 2023

2022
Traditional Machine Learning Methods for Side-Channel Analysis.
Security and Artificial Intelligence, 2022

ULTRA: Ultimate Rootkit Detection over the Air.
Proceedings of the 25th International Symposium on Research in Attacks, 2022

2021
Train or Adapt a Deeply Learned Profile?
Proceedings of the Progress in Cryptology - LATINCRYPT 2021, 2021

Poster: Obfuscation Revealed - Using Electromagnetic Emanation to Identify and Classify Malware.
Proceedings of the IEEE European Symposium on Security and Privacy, 2021

SE-PAC: A Self-Evolving PAcker Classifier against rapid packers evolution.
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021

Profiled Side-Channel Analysis in the Efficient Attacker Framework.
Proceedings of the Smart Card Research and Advanced Applications, 2021

Trace-to-Trace Translation for SCA.
Proceedings of the Smart Card Research and Advanced Applications, 2021

Obfuscation Revealed: Leveraging Electromagnetic Signals for Obfuscated Malware Classification.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

Accurate and Robust Malware Analysis through Similarity of External Calls Dependency Graphs (ECDG).
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

It Started with Templates: The Future of Profiling in Side-Channel Analysis.
Proceedings of the Security of Ubiquitous Computing Systems, 2021

2020
Lightweight Ciphers and Their Side-Channel Resilience.
IEEE Trans. Computers, 2020

On What to Learn: Train or Adapt a Deeply Learned Profile?
IACR Cryptol. ePrint Arch., 2020

Towards Secure Composition of Integrated Circuits and Electronic Systems: On the Role of EDA.
Proceedings of the 2020 Design, Automation & Test in Europe Conference & Exhibition, 2020

2019
A Systematic Evaluation of Profiling Through Focused Feature Selection.
IEEE Trans. Very Large Scale Integr. Syst., 2019

The Curse of Class Imbalance and Conflicting Metrics with Machine Learning for Side-channel Evaluations.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2019

Make Some Noise. Unleashing the Power of Convolutional Neural Networks for Profiled Side-channel Analysis.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2019

CC Meets FIPS: A Hybrid Test Methodology for First Order Side Channel Analysis.
IEEE Trans. Computers, 2019

Profiling Side-channel Analysis in the Restricted Attacker Framework.
IACR Cryptol. ePrint Arch., 2019

Mind the Portability: A Warriors Guide through Realistic Profiled Side-channel Analysis.
IACR Cryptol. ePrint Arch., 2019

An automated and scalable formal process for detecting fault injection vulnerabilities in binaries.
Concurr. Comput. Pract. Exp., 2019

2018
On the Performance of Deep Learning for Side-channel Analysis.
IACR Cryptol. ePrint Arch., 2018

When Theory Meets Practice: A Framework for Robust Profiled Side-channel Analysis.
IACR Cryptol. ePrint Arch., 2018

On the optimality and practicability of mutual information analysis in some scenarios.
Cryptogr. Commun., 2018

Scalable Approximation of Quantitative Information Flow in Programs.
Proceedings of the Verification, Model Checking, and Abstract Interpretation, 2018

On the Performance of Convolutional Neural Networks for Side-Channel Analysis.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2018

Improving Side-Channel Analysis Through Semi-supervised Learning.
Proceedings of the Smart Card Research and Advanced Applications, 2018

Physical Security Versus Masking Schemes.
Proceedings of the Cyber-Physical Systems Security., 2018

2017
Stochastic Collision Attack.
IEEE Trans. Inf. Forensics Secur., 2017

PFD - A Flexible Higher-Order Masking Scheme.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2017

Template attack versus Bayes classifier.
J. Cryptogr. Eng., 2017

Optimal side-channel attacks for multivariate leakages and multiple models.
J. Cryptogr. Eng., 2017

Profiled SCA with a New Twist: Semi-supervised Learning.
IACR Cryptol. ePrint Arch., 2017

The secrets of profiling for side-channel analysis: feature selection matters.
IACR Cryptol. ePrint Arch., 2017

Template Attack vs Bayes Classifier.
IACR Cryptol. ePrint Arch., 2017

Side-channel Analysis of Lightweight Ciphers: Does Lightweight Equal Easy?
IACR Cryptol. ePrint Arch., 2017

Stochastic Side-Channel Leakage Analysis via Orthonormal Decomposition.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2017

Side-channel analysis and machine learning: A practical perspective.
Proceedings of the 2017 International Joint Conference on Neural Networks, 2017

Do we need a holistic approach for the design of secure IoT systems?
Proceedings of the Computing Frontiers Conference, 2017

Codes for Side-Channel Attacks and Protections.
Proceedings of the Codes, Cryptology and Information Security, 2017

Climbing Down the Hierarchy: Hierarchical Classification for Machine Learning Side-Channel Attacks.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2017, 2017

Trade-Offs for S-Boxes: Cryptographic Properties and Side-Channel Resilience.
Proceedings of the Applied Cryptography and Network Security, 2017

2016
A Key to Success - Success Exponents for Side-Channel Distinguishers.
IACR Cryptol. ePrint Arch., 2016

Less is More - Dimensionality Reduction from a Theoretical Perspective.
IACR Cryptol. ePrint Arch., 2016

Time-Frequency Analysis for Second-Order Attacks.
IACR Cryptol. ePrint Arch., 2016

Inter-class vs. mutual information as side-channel distinguishers.
Proceedings of the IEEE International Symposium on Information Theory, 2016

Taylor Expansion of Maximum Likelihood Attacks for Masked and Shuffled Implementations.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016

2015
Masks will Fall Off - Higher-Order Optimal Distinguishers.
IACR Cryptol. ePrint Arch., 2015

2014
Practical improvements of side-channel attacks on AES: feedback from the 2nd DPA contest.
J. Cryptogr. Eng., 2014

Attacking Suggest Boxes in Web Applications Over HTTPS Using Side-Channel Stochastic Algorithms.
IACR Cryptol. ePrint Arch., 2014

Good is Not Good Enough: Deriving Optimal Distinguishers from Communication Theory.
IACR Cryptol. ePrint Arch., 2014

A Theoretical Study of Kolmogorov-Smirnov Distinguishers: Side-Channel Analysis vs. Differential Cryptanalysis.
IACR Cryptol. ePrint Arch., 2014

Boosting Higher-Order Correlation Attacks by Dimensionality Reduction.
IACR Cryptol. ePrint Arch., 2014

2013
Improved algebraic side-channel attack on AES.
J. Cryptogr. Eng., 2013

From cryptography to hardware: analyzing and protecting embedded Xilinx BRAM for cryptographic applications.
J. Cryptogr. Eng., 2013

Detecting Hidden Leakages.
IACR Cryptol. ePrint Arch., 2013

2012
Improved Algebraic Side-Channel Attack on AES.
IACR Cryptol. ePrint Arch., 2012

A Novel Analysis Method for Assessing the Side-Channel Resistance of Cryptosystems.
Proceedings of the Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2012

Revealing side-channel issues of complex circuits by enhanced leakage models.
Proceedings of the 2012 Design, Automation & Test in Europe Conference & Exhibition, 2012

A New Difference Method for Side-Channel Analysis with High-Dimensional Leakage Models.
Proceedings of the Topics in Cryptology - CT-RSA 2012 - The Cryptographers' Track at the RSA Conference 2012, San Francisco, CA, USA, February 27, 2012

Intelligent Machine Homicide - Breaking Cryptographic Devices Using Support Vector Machines.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2012

2011
How a Symmetry Metric Assists Side-Channel Evaluation - A Novel Model Verification Method for Power Analysis.
Proceedings of the 14th Euromicro Conference on Digital System Design, 2011


  Loading...