Dirmanto Jap

Orcid: 0000-0002-3149-9401

According to our database1, Dirmanto Jap authored at least 67 papers between 2014 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Defeating Low-Cost Countermeasures against Side-Channel Attacks in Lattice-based Encryption A Case Study on Crystals-Kyber.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024

Creating from Noise: Trace Generations Using Diffusion Model for Side-Channel Attack.
IACR Cryptol. ePrint Arch., 2024

Machine Learning based Blind Side-Channel Attacks on PQC-based KEMs - A Case Study of Kyber KEM.
IACR Cryptol. ePrint Arch., 2024

2023
Et tu, Brute? SCA Assisted CCA using Valid Ciphertexts - A Case Study on HQC KEM.
IACR Cryptol. ePrint Arch., 2023

A Survey on Fault Attacks on Symmetric Key Cryptosystems.
ACM Comput. Surv., 2023

Invited Paper: Machine Learning Based Blind Side-Channel Attacks on PQC-Based KEMs - A Case Study of Kyber KEM.
Proceedings of the IEEE/ACM International Conference on Computer Aided Design, 2023

Non-Profiled Side-Channel Assisted Fault Attack: A Case Study on DOMREP.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2023

A Desynchronization-Based Countermeasure Against Side-Channel Analysis of Neural Networks.
Proceedings of the Cyber Security, Cryptology, and Machine Learning, 2023

Using Model Optimization as Countermeasure against Model Recovery Attacks.
Proceedings of the Applied Cryptography and Network Security Workshops, 2023

2022
Traditional Machine Learning Methods for Side-Channel Analysis.
Security and Artificial Intelligence, 2022

On Implementation-Level Security of Edge-Based Machine Learning Models.
Security and Artificial Intelligence, 2022

SNIFF: Reverse Engineering of Neural Networks With Fault Attacks.
IEEE Trans. Reliab., 2022

Side Channel Attack On Stream Ciphers: A Three-Step Approach To State/Key Recovery.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022

Survey on the Effectiveness of DAPA-Related Attacks against Shift Register Based AEAD Schemes.
IACR Cryptol. ePrint Arch., 2022

SCA Strikes Back: Reverse-Engineering Neural Network Architectures Using Side Channels.
IEEE Des. Test, 2022

2021
Back to the Basics: Seamless Integration of Side-Channel Pre-Processing in Deep Neural Networks.
IEEE Trans. Inf. Forensics Secur., 2021

DAPA: Differential Analysis aided Power Attack on (Non-) Linear Feedback Shift Registers.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021

Explain Some Noise: Ablation Analysis for Deep Learning-based Physical Side-channel Analysis.
IACR Cryptol. ePrint Arch., 2021

Non-Profiled Side-Channel Attack Based on Deep Learning Using Picture Trace.
IEEE Access, 2021

Extraction of Binarized Neural Network Architecture and Secret Parameters Using Side-Channel Information.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2021

DeepFreeze: Cold Boot Attacks and High Fidelity Model Recovery on Commercial EdgeML Device.
Proceedings of the IEEE/ACM International Conference On Computer Aided Design, 2021

Time to Leak: Cross-Device Timing Attack On Edge Deep Learning Accelerator.
Proceedings of the International Conference on Electronics, Information, and Communication, 2021

Fault injection attacks on SoftMax function in deep neural networks.
Proceedings of the CF '21: Computing Frontiers Conference, 2021

WaC: First Results on Practical Side-Channel Attacks on Commercial Machine Learning Accelerator.
Proceedings of the ASHES@CCS 2021: Proceedings of the 5th Workshop on Attacks and Solutions in Hardware Security, 2021

Divided We Stand, United We Fall: Security Analysis of Some SCA+SIFA Countermeasures Against SCA-Enhanced Fault Template Attacks.
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021

2020
A Framework to Counter Statistical Ineffective Fault Analysis of Block Ciphers Using Domain Transformation and Error Correction.
IEEE Trans. Inf. Forensics Secur., 2020

On Side Channel Vulnerabilities of Bit Permutations in Cryptographic Algorithms.
IEEE Trans. Inf. Forensics Secur., 2020

SITM: See-In-The-Middle Side-Channel Assisted Middle Round Differential Cryptanalysis on SPN Block Ciphers.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020

Neural Network-based Inherently Fault-tolerant Hardware Cryptographic Primitives without Explicit Redundancy Checks.
ACM J. Emerg. Technol. Comput. Syst., 2020

Push For More: On Comparison of Data Augmentation and SMOTE With Optimised Deep Learning Architecture For Side-Channel.
IACR Cryptol. ePrint Arch., 2020

DAPA: Differential Analysis aided Power Attack on (Non-)Linear Feedback Shift Registers (Extended version).
IACR Cryptol. ePrint Arch., 2020

Fault Attacks In Symmetric Key Cryptosystems.
IACR Cryptol. ePrint Arch., 2020

Practical Reverse Engineering of Secret Sboxes by Side-Channel Analysis.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2020

Machine Learning and Hardware security: Challenges and Opportunities -Invited Talk-.
Proceedings of the IEEE/ACM International Conference On Computer Aided Design, 2020

Practical Side-Channel Based Model Extraction Attack on Tree-Based Machine Learning Algorithm.
Proceedings of the Applied Cryptography and Network Security Workshops, 2020

2019
Automatic Characterization of Exploitable Faults: A Machine Learning Approach.
IEEE Trans. Inf. Forensics Secur., 2019

SCADFA: Combined SCA+DFA Attacks on Block Ciphers with Practical Validations.
IEEE Trans. Computers, 2019

Experimental Evaluation of Deep Neural Network Resistance Against Fault Injection Attacks.
IACR Cryptol. ePrint Arch., 2019

Mind the Portability: A Warriors Guide through Realistic Profiled Side-channel Analysis.
IACR Cryptol. ePrint Arch., 2019

Enhancing Fault Tolerance of Neural Networks for Security-Critical Applications.
CoRR, 2019

CSI NN: Reverse Engineering of Neural Network Architectures Through Electromagnetic Side Channel.
Proceedings of the 28th USENIX Security Symposium, 2019

Poster: When Adversary Becomes the Guardian - Towards Side-channel Security With Adversarial Attacks.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

Poster: Recovering the Input of Neural Networks via Single Shot Side-channel Attacks.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Toward Threat of Implementation Attacks on Substation Security: Case Study on Fault Detection and Isolation.
IEEE Trans. Ind. Informatics, 2018

On Side-Channel Vulnerabilities of Bit Permutations: Key Recovery and Reverse Engineering.
IACR Cryptol. ePrint Arch., 2018

CSI Neural Network: Using Side-channels to Recover Your Artificial Neural Network Information.
IACR Cryptol. ePrint Arch., 2018

Feature Selection Methods for Non-Profiled Side-Channel Attacks on ECC.
Proceedings of the 23rd IEEE International Conference on Digital Signal Processing, 2018

Breaking Redundancy-Based Countermeasures with Random Faults and Power Side Channel.
Proceedings of the 2018 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2018

Practical Fault Attack on Deep Neural Networks.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

On Comparing Side-channel Properties of AES and ChaCha20 on Microcontrollers.
Proceedings of the 2018 IEEE Asia Pacific Conference on Circuits and Systems, 2018

2017
Practical Evaluation of FSE 2016 Customized Encoding Countermeasure.
IACR Trans. Symmetric Cryptol., 2017

Attacks in Reality: the Limits of Concurrent Error Detection Codes Against Laser Fault Injection.
J. Hardw. Syst. Secur., 2017

Extensive Laser Fault Injection Profiling of 65 nm FPGA.
J. Hardw. Syst. Secur., 2017

A study on analyzing side-channel resistant encoding schemes with respect to fault attacks.
J. Cryptogr. Eng., 2017

SCADPA: Side-Channel Assisted Differential-Plaintext Attack on Bit Permutation Based Ciphers.
IACR Cryptol. ePrint Arch., 2017

2016
Mistakes Are Proof That You Are Trying: On Verifying Software Encoding Schemes' Resistance to Fault Injection Attacks.
IACR Cryptol. ePrint Arch., 2016

Comprehensive Laser Sensitivity Profiling and Data Register Bit-Flips for Cryptographic Fault Attacks in 65 Nm FPGA.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2016

The other side of the coin: Analyzing software encoding schemes against fault injection attacks.
Proceedings of the 2016 IEEE International Symposium on Hardware Oriented Security and Trust, 2016

Supervised and unsupervised machine learning for side-channel based Trojan detection.
Proceedings of the 27th IEEE International Conference on Application-specific Systems, 2016

2015
Process Variation Evaluation Using RO PUF for Enhancing SCA-Resistant Dual-Rail Implementation.
Proceedings of the Information Security Applications - 16th International Workshop, 2015

Support vector regression: exploiting machine learning techniques for leakage modeling.
Proceedings of the Fourth Workshop on Hardware and Architectural Support for Security and Privacy, 2015

Differential Fault Attack on LEA.
Proceedings of the Information and Communication Technology, 2015

Testing Feasibility of Back-Side Laser Fault Injection on a Microcontroller.
Proceedings of the 10th Workshop on Embedded Systems Security, 2015

Laser Profiling for the Back-Side Fault Attacks: With a Practical Laser Skip Instruction Attack on AES.
Proceedings of the 1st ACM Workshop on Cyber-Physical System Security, 2015

Dual-rail active protection system against side-channel analysis in FPGAs.
Proceedings of the 26th IEEE International Conference on Application-specific Systems, 2015

2014
Overview of machine learning based side-channel analysis methods.
Proceedings of the 2014 International Symposium on Integrated Circuits (ISIC), 2014

A survey of the state-of-the-art fault attacks.
Proceedings of the 2014 International Symposium on Integrated Circuits (ISIC), 2014


  Loading...