Yoo-Seung Won

Orcid: 0000-0002-5205-7530

According to our database1, Yoo-Seung Won authored at least 14 papers between 2015 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Back to the Basics: Seamless Integration of Side-Channel Pre-Processing in Deep Neural Networks.
IEEE Trans. Inf. Forensics Secur., 2021

Explain Some Noise: Ablation Analysis for Deep Learning-based Physical Side-channel Analysis.
IACR Cryptol. ePrint Arch., 2021

Non-Profiled Side-Channel Attack Based on Deep Learning Using Picture Trace.
IEEE Access, 2021

A Systematic Side-Channel Evaluation of Black Box AES in Secure MCU: Architecture Recovery and Retrieval of PUF Based Secret Key.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2021

DeepFreeze: Cold Boot Attacks and High Fidelity Model Recovery on Commercial EdgeML Device.
Proceedings of the IEEE/ACM International Conference On Computer Aided Design, 2021

Are Cold Boot Attacks Still Feasible: A Case Study on Raspberry Pi With Stacked Memory.
Proceedings of the 18th Workshop on Fault Detection and Tolerance in Cryptography, 2021

Time to Leak: Cross-Device Timing Attack On Edge Deep Learning Accelerator.
Proceedings of the International Conference on Electronics, Information, and Communication, 2021

Fault injection attacks on SoftMax function in deep neural networks.
Proceedings of the CF '21: Computing Frontiers Conference, 2021

WaC: First Results on Practical Side-Channel Attacks on Commercial Machine Learning Accelerator.
Proceedings of the ASHES@CCS 2021: Proceedings of the 5th Workshop on Attacks and Solutions in Hardware Security, 2021

2020
Push For More: On Comparison of Data Augmentation and SMOTE With Optimised Deep Learning Architecture For Side-Channel.
IACR Cryptol. ePrint Arch., 2020

2019
Non-Profiled Side Channel Attack based on Deep learning using Picture Trace.
IACR Cryptol. ePrint Arch., 2019

2017
Novel Leakage Against Realistic Masking and Shuffling Countermeasures - Case Study on PRINCE and SEED.
Proceedings of the Information Security and Cryptology - ICISC 2017 - 20th International Conference, Seoul, South Korea, November 29, 2017

2016
Efficient Conversion Method from Arithmetic to Boolean Masking in Constrained Devices.
IACR Cryptol. ePrint Arch., 2016

2015
On the Security of Balanced Encoding Countermeasures.
Proceedings of the Smart Card Research and Advanced Applications, 2015


  Loading...