Xiaolu Hou

Orcid: 0000-0002-4512-6921

According to our database1, Xiaolu Hou authored at least 30 papers between 2014 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
FooBaR: Fault Fooling Backdoor Attack on Neural Network Training.
IEEE Trans. Dependable Secur. Comput., 2023

Another Look at Side-Channel Resistant Encoding Schemes.
IACR Cryptol. ePrint Arch., 2023

New Results on Machine Learning-Based Distinguishers.
IEEE Access, 2023

A Desynchronization-Based Countermeasure Against Side-Channel Analysis of Neural Networks.
Proceedings of the Cyber Security, Cryptology, and Machine Learning, 2023

2022
On Implementation-Level Security of Edge-Based Machine Learning Models.
Security and Artificial Intelligence, 2022

SNIFF: Reverse Engineering of Neural Networks With Fault Attacks.
IEEE Trans. Reliab., 2022

Constrained Proximity Attacks on Mobile Targets.
ACM Trans. Priv. Secur., 2022

SBCMA: Semi-Blind Combined Middle-Round Attack on Bit-Permutation Ciphers With Application to AEAD Schemes.
IEEE Trans. Inf. Forensics Secur., 2022

A Finer-Grain Analysis of the Leakage (Non) Resilience of OCB.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022

How Practical Are Fault Injection Attacks, Really?
IEEE Access, 2022

2021
Back to the Basics: Seamless Integration of Side-Channel Pre-Processing in Deep Neural Networks.
IEEE Trans. Inf. Forensics Secur., 2021

On Evaluating Fault Resilient Encoding Schemes in Software.
IEEE Trans. Dependable Secur. Comput., 2021

2020
On Side Channel Vulnerabilities of Bit Permutations in Cryptographic Algorithms.
IEEE Trans. Inf. Forensics Secur., 2020

SITM: See-In-The-Middle Side-Channel Assisted Middle Round Differential Cryptanalysis on SPN Block Ciphers.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020

DNFA: Differential No-Fault Analysis of Bit Permutation Based Ciphers Assisted by Side-Channel.
IACR Cryptol. ePrint Arch., 2020

2019
Fully Automated Differential Fault Analysis on Software Implementations of Block Ciphers.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2019

SoK : On DFA Vulnerabilities of Substitution-Permutation Networks.
IACR Cryptol. ePrint Arch., 2019

Experimental Evaluation of Deep Neural Network Resistance Against Fault Injection Attacks.
IACR Cryptol. ePrint Arch., 2019

A Countermeasure Against Statistical Ineffective Fault Analysis.
IACR Cryptol. ePrint Arch., 2019

2018
Fault Attacks Made Easy: Differential Fault Analysis Automation on Assembly Code.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018

Fully Automated Differential Fault Analysis on Software Implementations of Cryptographic Algorithms.
IACR Cryptol. ePrint Arch., 2018

On Side-Channel Vulnerabilities of Bit Permutations: Key Recovery and Reverse Engineering.
IACR Cryptol. ePrint Arch., 2018

Fault Resilient Encoding Schemes in Software: How Far Can We Go?
IACR Cryptol. ePrint Arch., 2018

Location Proximity Attacks Against Mobile Targets: Analytical Bounds and Attacker Strategies.
Proceedings of the Computer Security, 2018

Practical Fault Attack on Deep Neural Networks.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Fault Attacks Made Easy: Differential Fault Analysis Automation on Assembly Code.
IACR Cryptol. ePrint Arch., 2017

Modular lattices from a variation of construction a over number fields.
Adv. Math. Commun., 2017

2016
Feeding Two Cats with One Bowl: On Designing a Fault and Side-Channel Resistant Software Encoding Scheme.
IACR Cryptol. ePrint Arch., 2016

On LCD codes and lattices.
Proceedings of the IEEE International Symposium on Information Theory, 2016

2014
Construction and secrecy gain of a family of 5-modular lattices.
Proceedings of the 2014 IEEE Information Theory Workshop, 2014


  Loading...