On the Effect of Clock Frequency on Voltage and Electromagnetic Fault Injection
|
2022 |
Koffas, Stefanos |
A Methodology for Training Homomorphic Encryption Friendly Neural Networks
|
2022 |
Baruch, Moran |
Scalable and Secure HTML5 Canvas-Based User Authentication
|
2022 |
Rivera, Esteban |
POSTER: Ransomware Detection Mechanism - Current State of the Project
|
2022 |
Glet, Michał |
POSTER: Enabling User-Accountable Mechanisms in Decision Systems
|
2022 |
Giustolisi, Rosario |
POSTER: ODABE: Outsourced Decentralized CP-ABE in Internet of Things
|
2022 |
Kamel, Mohammed B. M. |
A Side-Channel Based Disassembler for the ARM-Cortex M0
|
2022 |
van Geest, Jurian |
SuppliedTrust: A Trusted Blockchain Architecture for Supply Chains
|
2022 |
Lim, Yong Zhi |
Output Prediction Attacks on Block Ciphers Using Deep Learning
|
2022 |
Kimura, Hayato |
RATLS: Integrating Transport Layer Security with Remote Attestation
|
2022 |
Walther, Robert |
DLPFS: The Data Leakage Prevention FileSystem
|
2022 |
Braghin, Stefano |
The Etiology of Cybersecurity
|
2022 |
Ambrosi, Michele |
POSTER: A Transparent Remote Quantum Random Number Generator over a Quantum-Safe Link
|
2022 |
Kozlovičs, Sergejs |
Poster: Key Generation Scheme Based on Physical Layer
|
2022 |
Zhao, Hong |
Vulnerability Detection for Smart Contract via Backward Bayesian Active Learning
|
2022 |
Zhang, Jiale |
Universal Physical Adversarial Attack via Background Image
|
2022 |
Xu, Yidan |
Order vs. Chaos: Multi-trunk Classifier for Side-Channel Attack
|
2022 |
Kulkarni, Praveen |
Deep Learning-Based Side-Channel Analysis Against AES Inner Rounds
|
2022 |
Swaminathan, Sudharshan |
Leaky Blinders: Information Leakage in Mobile VPNs
|
2022 |
Heijligenberg, Thijs |
Toward Safe Integration of Legacy SCADA Systems in the Smart Grid
|
2022 |
Chan, Aldar C.-F. |