default search action
Annelie Heuser
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j15]Stjepan Picek, Annelie Heuser, Alan Jovic, Shivam Bhasin, Francesco Regazzoni:
Tipping the Balance: Imbalanced Classes in Deep-Learning Side-Channel Analysis. IEEE Des. Test 41(2): 32-38 (2024) - 2023
- [c38]Damien Marion, Duy-Phuc Pham, Annelie Heuser:
When Side-channel Meets Malware (short paper). C&ESAR 2023: 71-77 - 2022
- [c37]Duy-Phuc Pham, Damien Marion, Annelie Heuser:
ULTRA: Ultimate Rootkit Detection over the Air. RAID 2022: 232-251 - [p3]Alan Jovic, Dirmanto Jap, Louiza Papachristodoulou, Annelie Heuser:
Traditional Machine Learning Methods for Side-Channel Analysis. Security and Artificial Intelligence 2022: 25-47 - 2021
- [c36]Cassius Puodzius, Olivier Zendra, Annelie Heuser, Lamine Noureddine:
Accurate and Robust Malware Analysis through Similarity of External Calls Dependency Graphs (ECDG). ARES 2021: 57:1-57:12 - [c35]Duy-Phuc Pham, Damien Marion, Matthieu Mastio, Annelie Heuser:
Obfuscation Revealed: Leveraging Electromagnetic Signals for Obfuscated Malware Classification. ACSAC 2021: 706-719 - [c34]Christophe Genevey-Metat, Annelie Heuser, Benoît Gérard:
Trace-to-Trace Translation for SCA. CARDIS 2021: 24-43 - [c33]Stjepan Picek, Annelie Heuser, Guilherme Perin, Sylvain Guilley:
Profiled Side-Channel Analysis in the Efficient Attacker Framework. CARDIS 2021: 44-63 - [c32]Lamine Noureddine, Annelie Heuser, Cassius Puodzius, Olivier Zendra:
SE-PAC: A Self-Evolving PAcker Classifier against rapid packers evolution. CODASPY 2021: 281-292 - [c31]Duy-Phuc Pham, Damien Marion, Annelie Heuser:
Poster: Obfuscation Revealed - Using Electromagnetic Emanation to Identify and Classify Malware. EuroS&P 2021: 710-712 - [c30]Christophe Genevey-Metat, Annelie Heuser, Benoît Gérard:
Train or Adapt a Deeply Learned Profile? LATINCRYPT 2021: 213-232 - [p2]Lejla Batina, Milena Djukanovic, Annelie Heuser, Stjepan Picek:
It Started with Templates: The Future of Profiling in Side-Channel Analysis. Security of Ubiquitous Computing Systems 2021: 133-145 - 2020
- [j14]Annelie Heuser, Stjepan Picek, Sylvain Guilley, Nele Mentens:
Lightweight Ciphers and Their Side-Channel Resilience. IEEE Trans. Computers 69(10): 1434-1448 (2020) - [c29]Johann Knechtel, Elif Bilge Kavun, Francesco Regazzoni, Annelie Heuser, Anupam Chattopadhyay, Debdeep Mukhopadhyay, Soumyajit Dey, Yunsi Fei, Yaacov Belenky, Itamar Levi, Tim Güneysu, Patrick Schaumont, Ilia Polian:
Towards Secure Composition of Integrated Circuits and Electronic Systems: On the Role of EDA. DATE 2020: 508-513 - [c28]Shivam Bhasin, Anupam Chattopadhyay, Annelie Heuser, Dirmanto Jap, Stjepan Picek, Ritu Ranjan Shrivastwa:
Mind the Portability: A Warriors Guide through Realistic Profiled Side-channel Analysis. NDSS 2020 - [i22]Johann Knechtel, Elif Bilge Kavun, Francesco Regazzoni, Annelie Heuser, Anupam Chattopadhyay, Debdeep Mukhopadhyay, Soumyajit Dey, Yunsi Fei, Yaacov Belenky, Itamar Levi, Tim Güneysu, Patrick Schaumont, Ilia Polian:
Towards Secure Composition of Integrated Circuits and Electronic Systems: On the Role of EDA. CoRR abs/2001.09672 (2020) - [i21]Christophe Genevey-Metat, Benoît Gérard, Annelie Heuser:
On What to Learn: Train or Adapt a Deeply Learned Profile? IACR Cryptol. ePrint Arch. 2020: 952 (2020)
2010 – 2019
- 2019
- [j13]Thomas Given-Wilson, Annelie Heuser, Nisrine Jafri, Axel Legay:
An automated and scalable formal process for detecting fault injection vulnerabilities in binaries. Concurr. Comput. Pract. Exp. 31(23) (2019) - [j12]Debapriya Basu Roy, Shivam Bhasin, Sylvain Guilley, Annelie Heuser, Sikhar Patranabis, Debdeep Mukhopadhyay:
CC Meets FIPS: A Hybrid Test Methodology for First Order Side Channel Analysis. IEEE Trans. Computers 68(3): 347-361 (2019) - [j11]Stjepan Picek, Annelie Heuser, Alan Jovic, Shivam Bhasin, Francesco Regazzoni:
The Curse of Class Imbalance and Conflicting Metrics with Machine Learning for Side-channel Evaluations. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2019(1): 209-237 (2019) - [j10]Jaehun Kim, Stjepan Picek, Annelie Heuser, Shivam Bhasin, Alan Hanjalic:
Make Some Noise. Unleashing the Power of Convolutional Neural Networks for Profiled Side-channel Analysis. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2019(3): 148-179 (2019) - [j9]Stjepan Picek, Annelie Heuser, Alan Jovic, Lejla Batina:
A Systematic Evaluation of Profiling Through Focused Feature Selection. IEEE Trans. Very Large Scale Integr. Syst. 27(12): 2802-2815 (2019) - [i20]Stjepan Picek, Annelie Heuser, Sylvain Guilley:
Profiling Side-channel Analysis in the Restricted Attacker Framework. IACR Cryptol. ePrint Arch. 2019: 168 (2019) - [i19]Shivam Bhasin, Anupam Chattopadhyay, Annelie Heuser, Dirmanto Jap, Stjepan Picek, Ritu Ranjan Shrivastwa:
Mind the Portability: A Warriors Guide through Realistic Profiled Side-channel Analysis. IACR Cryptol. ePrint Arch. 2019: 661 (2019) - 2018
- [j8]Eloi de Chérisey, Sylvain Guilley, Annelie Heuser, Olivier Rioul:
On the optimality and practicability of mutual information analysis in some scenarios. Cryptogr. Commun. 10(1): 101-121 (2018) - [c27]Stjepan Picek, Annelie Heuser, Alan Jovic, Karlo Knezevic, Tania Richmond:
Improving Side-Channel Analysis Through Semi-supervised Learning. CARDIS 2018: 35-50 - [c26]Stjepan Picek, Ioannis Petros Samiotis, Jaehun Kim, Annelie Heuser, Shivam Bhasin, Axel Legay:
On the Performance of Convolutional Neural Networks for Side-Channel Analysis. SPACE 2018: 157-176 - [c25]Fabrizio Biondi, Michael A. Enescu, Annelie Heuser, Axel Legay, Kuldeep S. Meel, Jean Quilbeuf:
Scalable Approximation of Quantitative Information Flow in Programs. VMCAI 2018: 71-93 - [p1]Jean-Luc Danger, Sylvain Guilley, Annelie Heuser, Axel Legay, Ming Tang:
Physical Security Versus Masking Schemes. Cyber-Physical Systems Security 2018: 269-284 - [i18]Stjepan Picek, Ioannis Petros Samiotis, Annelie Heuser, Jaehun Kim, Shivam Bhasin, Axel Legay:
On the Performance of Deep Learning for Side-channel Analysis. IACR Cryptol. ePrint Arch. 2018: 4 (2018) - [i17]Stjepan Picek, Annelie Heuser, Alan Jovic, Shivam Bhasin, Francesco Regazzoni:
The Curse of Class Imbalance and Conflicting Metrics with Machine Learning for Side-channel Evaluations. IACR Cryptol. ePrint Arch. 2018: 476 (2018) - [i16]Jaehun Kim, Stjepan Picek, Annelie Heuser, Shivam Bhasin, Alan Hanjalic:
Make Some Noise: Unleashing the Power of Convolutional Neural Networks for Profiled Side-channel Analysis. IACR Cryptol. ePrint Arch. 2018: 1023 (2018) - [i15]Stjepan Picek, Annelie Heuser, Cesare Alippi, Francesco Regazzoni:
When Theory Meets Practice: A Framework for Robust Profiled Side-channel Analysis. IACR Cryptol. ePrint Arch. 2018: 1123 (2018) - 2017
- [j7]Nicolas Bruneau, Sylvain Guilley, Annelie Heuser, Damien Marion, Olivier Rioul:
Optimal side-channel attacks for multivariate leakages and multiple models. J. Cryptogr. Eng. 7(4): 331-341 (2017) - [j6]Stjepan Picek, Annelie Heuser, Sylvain Guilley:
Template attack versus Bayes classifier. J. Cryptogr. Eng. 7(4): 343-351 (2017) - [j5]Ming Tang, Zhipeng Guo, Annelie Heuser, Yanzhen Ren, Jie Li, Jean-Luc Danger:
PFD - A Flexible Higher-Order Masking Scheme. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 36(8): 1327-1339 (2017) - [j4]Nicolas Bruneau, Claude Carlet, Sylvain Guilley, Annelie Heuser, Emmanuel Prouff, Olivier Rioul:
Stochastic Collision Attack. IEEE Trans. Inf. Forensics Secur. 12(9): 2090-2104 (2017) - [c24]Claude Carlet, Annelie Heuser, Stjepan Picek:
Trade-Offs for S-Boxes: Cryptographic Properties and Side-Channel Resilience. ACNS 2017: 393-414 - [c23]Stjepan Picek, Annelie Heuser, Alan Jovic, Axel Legay:
Climbing Down the Hierarchy: Hierarchical Classification for Machine Learning Side-Channel Attacks. AFRICACRYPT 2017: 61-78 - [c22]Sylvain Guilley, Annelie Heuser, Olivier Rioul:
Codes for Side-Channel Attacks and Protections. C2SI 2017: 35-55 - [c21]Mauro Conti, Giorgio Di Natale, Annelie Heuser, Thomas Pöppelmann, Nele Mentens:
Do we need a holistic approach for the design of secure IoT systems? Conf. Computing Frontiers 2017: 425-430 - [c20]Stjepan Picek, Annelie Heuser, Alan Jovic, Simone A. Ludwig, Sylvain Guilley, Domagoj Jakobovic, Nele Mentens:
Side-channel analysis and machine learning: A practical perspective. IJCNN 2017: 4095-4102 - [c19]Sylvain Guilley, Annelie Heuser, Ming Tang, Olivier Rioul:
Stochastic Side-Channel Leakage Analysis via Orthonormal Decomposition. SECITC 2017: 12-27 - [i14]Annelie Heuser, Stjepan Picek, Sylvain Guilley, Nele Mentens:
Side-channel Analysis of Lightweight Ciphers: Does Lightweight Equal Easy? IACR Cryptol. ePrint Arch. 2017: 261 (2017) - [i13]Stjepan Picek, Annelie Heuser, Sylvain Guilley:
Template Attack vs Bayes Classifier. IACR Cryptol. ePrint Arch. 2017: 531 (2017) - [i12]Stjepan Picek, Annelie Heuser, Alan Jovic, Axel Legay, Karlo Knezevic:
Profiled SCA with a New Twist: Semi-supervised Learning. IACR Cryptol. ePrint Arch. 2017: 1085 (2017) - [i11]Stjepan Picek, Annelie Heuser, Alan Jovic, Lejla Batina, Axel Legay:
The secrets of profiling for side-channel analysis: feature selection matters. IACR Cryptol. ePrint Arch. 2017: 1110 (2017) - 2016
- [c18]Nicolas Bruneau, Sylvain Guilley, Annelie Heuser, Olivier Rioul, François-Xavier Standaert, Yannick Teglia:
Taylor Expansion of Maximum Likelihood Attacks for Masked and Shuffled Implementations. ASIACRYPT (1) 2016: 573-601 - [c17]Olivier Rioul, Annelie Heuser, Sylvain Guilley, Jean-Luc Danger:
Inter-class vs. mutual information as side-channel distinguishers. ISIT 2016: 805-809 - [c16]Annelie Heuser, Stjepan Picek, Sylvain Guilley, Nele Mentens:
Side-Channel Analysis of Lightweight Ciphers: Does Lightweight Equal Easy? RFIDSec 2016: 91-104 - [i10]Nicolas Bruneau, Sylvain Guilley, Annelie Heuser, Damien Marion, Olivier Rioul:
Less is More - Dimensionality Reduction from a Theoretical Perspective. IACR Cryptol. ePrint Arch. 2016: 359 (2016) - [i9]Pierre Belgarric, Shivam Bhasin, Nicolas Bruneau, Jean-Luc Danger, Nicolas Debande, Sylvain Guilley, Annelie Heuser, Zakaria Najm, Olivier Rioul:
Time-Frequency Analysis for Second-Order Attacks. IACR Cryptol. ePrint Arch. 2016: 772 (2016) - [i8]Sylvain Guilley, Annelie Heuser, Olivier Rioul:
A Key to Success - Success Exponents for Side-Channel Distinguishers. IACR Cryptol. ePrint Arch. 2016: 987 (2016) - 2015
- [c15]Nicolas Bruneau, Sylvain Guilley, Annelie Heuser, Damien Marion, Olivier Rioul:
Less is More - Dimensionality Reduction from a Theoretical Perspective. CHES 2015: 22-41 - [c14]Sylvain Guilley, Annelie Heuser, Olivier Rioul:
A Key to Success - Success Exponents for Side-Channel Distinguishers. INDOCRYPT 2015: 270-290 - [i7]Nicolas Bruneau, Sylvain Guilley, Annelie Heuser, Olivier Rioul:
Masks will Fall Off - Higher-Order Optimal Distinguishers. IACR Cryptol. ePrint Arch. 2015: 452 (2015) - 2014
- [j3]Christophe Clavier, Jean-Luc Danger, Guillaume Duc, M. Abdelaziz Elaabid, Benoît Gérard, Sylvain Guilley, Annelie Heuser, Michael Kasper, Yang Li, Victor Lomné, Daisuke Nakatsu, Kazuo Ohta, Kazuo Sakiyama, Laurent Sauvage, Werner Schindler, Marc Stöttinger, Nicolas Veyrat-Charvillon, Matthieu Walle, Antoine Wurcker:
Practical improvements of side-channel attacks on AES: feedback from the 2nd DPA contest. J. Cryptogr. Eng. 4(4): 259-274 (2014) - [c13]Amir Moradi, Sylvain Guilley, Annelie Heuser:
Detecting Hidden Leakages. ACNS 2014: 324-342 - [c12]Nicolas Bruneau, Sylvain Guilley, Annelie Heuser, Olivier Rioul:
Masks Will Fall Off - Higher-Order Optimal Distinguishers. ASIACRYPT (2) 2014: 344-365 - [c11]Annelie Heuser, Olivier Rioul, Sylvain Guilley:
Good Is Not Good Enough - Deriving Optimal Distinguishers from Communication Theory. CHES 2014: 55-74 - [c10]Annelie Heuser, Olivier Rioul, Sylvain Guilley:
A Theoretical Study of Kolmogorov-Smirnov Distinguishers - Side-Channel Analysis vs. Differential Cryptanalysis. COSADE 2014: 9-28 - [c9]Alexander Schaub, Emmanuel Schneider, Alexandros Hollender, Vinicius Calasans, Laurent Jolie, Robin Touillon, Annelie Heuser, Sylvain Guilley, Olivier Rioul:
Attacking Suggest Boxes in Web Applications Over HTTPS Using Side-Channel Stochastic Algorithms. CRiSIS 2014: 116-130 - [c8]Nicolas Bruneau, Jean-Luc Danger, Sylvain Guilley, Annelie Heuser, Yannick Teglia:
Boosting Higher-Order Correlation Attacks by Dimensionality Reduction. SPACE 2014: 183-200 - [i6]Annelie Heuser, Sylvain Guilley, Olivier Rioul:
A Theoretical Study of Kolmogorov-Smirnov Distinguishers: Side-Channel Analysis vs. Differential Cryptanalysis. IACR Cryptol. ePrint Arch. 2014: 8 (2014) - [i5]Annelie Heuser, Olivier Rioul, Sylvain Guilley:
Good is Not Good Enough: Deriving Optimal Distinguishers from Communication Theory. IACR Cryptol. ePrint Arch. 2014: 527 (2014) - [i4]Nicolas Bruneau, Jean-Luc Danger, Sylvain Guilley, Annelie Heuser, Yannick Teglia:
Boosting Higher-Order Correlation Attacks by Dimensionality Reduction. IACR Cryptol. ePrint Arch. 2014: 935 (2014) - [i3]Alexander Schaub, Emmanuel Schneider, Alexandros Hollender, Vinicius Calasans, Laurent Jolie, Robin Touillon, Annelie Heuser, Sylvain Guilley, Olivier Rioul:
Attacking Suggest Boxes in Web Applications Over HTTPS Using Side-Channel Stochastic Algorithms. IACR Cryptol. ePrint Arch. 2014: 959 (2014) - 2013
- [j2]Mohamed Saied Emam Mohamed, Stanislav Bulygin, Michael Zohner, Annelie Heuser, Michael Walter, Johannes Buchmann:
Improved algebraic side-channel attack on AES. J. Cryptogr. Eng. 3(3): 139-156 (2013) - [j1]Shivam Bhasin, Sylvain Guilley, Annelie Heuser, Jean-Luc Danger:
From cryptography to hardware: analyzing and protecting embedded Xilinx BRAM for cryptographic applications. J. Cryptogr. Eng. 3(4): 213-225 (2013) - [c7]Pierre Belgarric, Shivam Bhasin, Nicolas Bruneau, Jean-Luc Danger, Nicolas Debande, Sylvain Guilley, Annelie Heuser, Zakaria Najm, Olivier Rioul:
Time-Frequency Analysis for Second-Order Attacks. CARDIS 2013: 108-122 - [i2]Amir Moradi, Sylvain Guilley, Annelie Heuser:
Detecting Hidden Leakages. IACR Cryptol. ePrint Arch. 2013: 842 (2013) - 2012
- [c6]Annelie Heuser, Michael Zohner:
Intelligent Machine Homicide - Breaking Cryptographic Devices Using Support Vector Machines. COSADE 2012: 249-264 - [c5]Annelie Heuser, Michael Kasper, Werner Schindler, Marc Stöttinger:
A New Difference Method for Side-Channel Analysis with High-Dimensional Leakage Models. CT-RSA 2012: 365-382 - [c4]Annelie Heuser, Werner Schindler, Marc Stöttinger:
Revealing side-channel issues of complex circuits by enhanced leakage models. DATE 2012: 1179-1184 - [c3]Mohamed Saied Emam Mohamed, Stanislav Bulygin, Michael Zohner, Annelie Heuser, Michael Walter, Johannes Buchmann:
Improved algebraic side-channel attack on AES. HOST 2012: 146-151 - [c2]Qizhi Tian, Annelie Heuser, Sorin A. Huss:
A Novel Analysis Method for Assessing the Side-Channel Resistance of Cryptosystems. IIH-MSP 2012: 480-485 - [i1]Mohamed Saied Emam Mohamed, Stanislav Bulygin, Michael Zohner, Annelie Heuser, Michael Walter:
Improved Algebraic Side-Channel Attack on AES. IACR Cryptol. ePrint Arch. 2012: 84 (2012) - 2011
- [c1]Annelie Heuser, Michael Kasper, Werner Schindler, Marc Stöttinger:
How a Symmetry Metric Assists Side-Channel Evaluation - A Novel Model Verification Method for Power Analysis. DSD 2011: 674-681
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:26 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint