Fatemeh Ganji

Orcid: 0000-0003-0151-1307

According to our database1, Fatemeh Ganji authored at least 56 papers between 2013 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Too Hot To Be True: Temperature Calibration for Higher Confidence in NN-assisted Side-channel Analysis.
IACR Cryptol. ePrint Arch., 2024

1/0 Shades of UC: Photonic Side-Channel Analysis of Universal Circuits.
IACR Cryptol. ePrint Arch., 2024

2023
A Fast Object Detection-Based Framework for Via Modeling on PCB X-Ray CT Images.
ACM J. Emerg. Technol. Comput. Syst., October, 2023

A Survey and Perspective on Artificial Intelligence for Security-Aware Electronic Design Automation.
ACM Trans. Design Autom. Electr. Syst., March, 2023

Information Theory-based Evolution of Neural Networks for Side-channel Analysis.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023

Bake It Till You Make It: Heat-induced Leakage from Masked Neural Networks.
IACR Cryptol. ePrint Arch., 2023

Time is money, friend! Timing Side-channel Attack against Garbled Circuit Constructions.
IACR Cryptol. ePrint Arch., 2023

Quantization-aware Neural Architectural Search for Intrusion Detection.
CoRR, 2023

2022
Artificial Neural Networks and Fault Injection Attacks.
Security and Artificial Intelligence, 2022

Physically Unclonable Functions and AI - Two Decades of Marriage.
Security and Artificial Intelligence, 2022

ScatterVerif: Verification of Electronic Boards Using Reflection Response of Power Distribution Network.
ACM J. Emerg. Technol. Comput. Syst., 2022

Physical security in the post-quantum era.
J. Cryptogr. Eng., 2022

HWGN2: Side-channel Protected Neural Networks through Secure and Private Function Evaluation.
CoRR, 2022

HWGN<sup>2</sup>: Side-Channel Protected NNs Through Secure and Private Function Evaluation.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2022

Garbled EDA: Privacy Preserving Electronic Design Automation.
Proceedings of the 41st IEEE/ACM International Conference on Computer-Aided Design, 2022

Hardware Moving Target Defenses against Physical Attacks: Design Challenges and Opportunities.
Proceedings of the 9th ACM Workshop on Moving Target Defense, 2022

2021
An Analysis of Enrollment and Query Attacks on Hierarchical Bloom Filter-Based Biometric Systems.
IEEE Trans. Inf. Forensics Secur., 2021

BLOcKeR: A Biometric Locking Paradigm for IoT and the Connected Person.
J. Hardw. Syst. Secur., 2021

Hardware Trust and Assurance through Reverse Engineering: A Tutorial and Outlook from Image Analysis and Machine Learning Perspectives.
ACM J. Emerg. Technol. Comput. Syst., 2021

Rock'n'roll PUFs: crafting provably secure pufs from less secure ones (extended version).
J. Cryptogr. Eng., 2021

Circuit Masking: From Theory to Standardization, A Comprehensive Survey for Hardware Security Researchers and Practitioners.
CoRR, 2021

InfoNEAT: Information Theory-based NeuroEvolution of Augmenting Topologies for Side-channel Analysis.
CoRR, 2021

RNNIDS: Enhancing network intrusion detection systems through deep learning.
Comput. Secur., 2021

Real-World Snapshots vs. Theory: Questioning the t-Probing Security Model.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

Chaogate Parameter Optimization using Bayesian Optimization and Genetic Algorithm.
Proceedings of the 22nd International Symposium on Quality Electronic Design, 2021

2020
Recycled SoC Detection Using LDO Degradation.
SN Comput. Sci., 2020

Physically Unclonable Functions and AI: Two Decades of Marriage.
CoRR, 2020

Artificial Neural Networks and Fault Injection Attacks.
CoRR, 2020

Physical Security in the Post-quantum Era: A Survey on Side-channel Analysis, Random Number Generators, and Physically Unclonable Functions.
CoRR, 2020

Towards an Insightful Computer Security Seminar.
CoRR, 2020

Hardware Trust and Assurance through Reverse Engineering: A Survey and Outlook from Image Analysis and Machine Learning Perspectives.
CoRR, 2020

Low-Cost Remarked Counterfeit IC Detection using LDO Regulators.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2020

Attack of the Genes: Finding Keys and Parameters of Locked Analog ICs Using Genetic Algorithm.
Proceedings of the 2020 IEEE International Symposium on Hardware Oriented Security and Trust, 2020

Pitfalls in Machine Learning-based Adversary Modeling for Hardware Systems.
Proceedings of the 2020 Design, Automation & Test in Europe Conference & Exhibition, 2020

2019
Theoretical and Practical Approaches for Hardness Amplification of PUFs.
IACR Cryptol. ePrint Arch., 2019

Blockchain-enabled Cryptographically-secure Hardware Obfuscation.
IACR Cryptol. ePrint Arch., 2019

PUFmeter a Property Testing Tool for Assessing the Robustness of Physically Unclonable Functions to Machine Learning Attacks.
IEEE Access, 2019

Rock'n'roll PUFs: Crafting Provably Secure PUFs from Less Secure Ones.
Proceedings of 8th International Workshop on Security Proofs for Embedded Systems, 2019

Recycled Analog and Mixed Signal Chip Detection at Zero Cost Using LDO Degradation.
Proceedings of the IEEE International Test Conference, 2019

RAM-Jam: Remote Temperature and Voltage Fault Attack on FPGAs using Memory Collisions.
Proceedings of the 2019 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2019

Hierarchical Bloom Filter Framework for Security, Space-efficiency, and Rapid Query Handling in Biometric Systems.
Proceedings of the 10th IEEE International Conference on Biometrics Theory, 2019

2018
Recurrent Neural Networks for Enhancement of Signature-based Network Intrusion Detection Systems.
CoRR, 2018

A Fourier Analysis Based Attack Against Physically Unclonable Functions.
Proceedings of the Financial Cryptography and Data Security, 2018

2017
On the learnability of physically unclonable functions.
PhD thesis, 2017

Having no mathematical model may not secure PUFs.
J. Cryptogr. Eng., 2017

Noise-Tolerant Machine Learning Attacks against Physically Unclonable Functions.
IACR Cryptol. ePrint Arch., 2017

2016
PAC learning of arbiter PUFs.
J. Cryptogr. Eng., 2016

Strong Machine Learning Attack against PUFs with No Mathematical Model.
IACR Cryptol. ePrint Arch., 2016

2015
Greening campus WLANs: Energy-relevant usage and mobility patterns.
Comput. Networks, 2015

Why Attackers Win: On the Learnability of XOR Arbiter PUFs.
Proceedings of the Trust and Trustworthy Computing - 8th International Conference, 2015

Let Me Prove It to You: RO PUFs Are Provably Learnable.
Proceedings of the Information Security and Cryptology - ICISC 2015, 2015

Laser Fault Attack on Physically Unclonable Functions.
Proceedings of the 2015 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2015

Lattice Basis Reduction Attack against Physically Unclonable Functions.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Dynamic Resource Provisioning for Energy Efficiency in Wireless Access Networks: A Survey and an Outlook.
IEEE Commun. Surv. Tutorials, 2014

On detecting WLAN users communication attempts.
Proceedings of the 7th IFIP Wireless and Mobile Networking Conference, 2014

2013
Assessment of the power saving potential in dense enterprise WLANs.
Proceedings of the 24th IEEE Annual International Symposium on Personal, 2013


  Loading...