16 results on '"Buhan, I."'
Search Results
2. Artificial Intelligence for the Design of Symmetric Cryptographic Primitives
- Author
-
Batina, L, Bäck, T, Buhan, I, Picek, S, Mariot, L, Jakobovic, D, Hernandez-Castro, J, Mariot, Luca, Jakobovic, Domagoj, Bäck, Thomas, Hernandez-Castro, Julio, Batina, L, Bäck, T, Buhan, I, Picek, S, Mariot, L, Jakobovic, D, Hernandez-Castro, J, Mariot, Luca, Jakobovic, Domagoj, Bäck, Thomas, and Hernandez-Castro, Julio
- Abstract
This chapter provides a general overview of AI methods used to support the design of cryptographic primitives and protocols. After giving a brief introduction to the basic concepts underlying the field of cryptography, we review the most researched use cases concerning the use of AI techniques and models to design cryptographic primitives, focusing mainly on Boolean functions, S-boxes and pseudorandom number generators. We then point out two interesting directions for further research on the design of cryptographic primitives where AI methods could be applied in the future.
- Published
- 2022
3. Deep Learning on Side-Channel Analysis
- Author
-
Batina, L., Bäck, T., Buhan, I., Picek, S., Krček, M., Li, H., Paguada, S., Rioja, U., Wu, L., Perin, G., Chmielewski, L.M., Batina, L., Bäck, T., Buhan, I., Picek, S., Krček, M., Li, H., Paguada, S., Rioja, U., Wu, L., Perin, G., and Chmielewski, L.M.
- Abstract
Item does not contain fulltext, This chapter provides an overview of recent applications of deep learning to profiled side-channel analysis (SCA). The advent of deep neural networks (mainly multiple layer perceptrons and convolutional neural networks) as a learning algorithm for profiled SCA opened several new directions and possibilities to explore the occurrence of side-channel leakages from different categories of systems. This is particularly important for designers to verify to what extent an adversary can extract sensitive information when possessing state-of-the-art attack methods. Deep learning is a fast-evolving technology that provides several advantages in profiled SCA and we summarize what are the main directions and results obtained by the research community.
- Published
- 2022
4. On Implementation-Level Security of Edge-Based Machine Learning Models
- Author
-
Batina, L., Bäck, T., Buhan, I., Picek, S., Bhasin, S., Breier, J., Hou, X., Jap, D., Batina, L., Bäck, T., Buhan, I., Picek, S., Bhasin, S., Breier, J., Hou, X., and Jap, D.
- Abstract
Item does not contain fulltext, In this chapter, we are considering the physical security of Machine Learning (ML) implementations on Edge Devices. We list the state-of-the-art known physical attacks, with the main attack objectives to reverse engineer and misclassify ML models. These attacks have been reported for different target platforms with the usage of both passive and active attacks. The presented works highlight the potential threat of stealing an intellectual property or confidential model trained with private data, and also the possibility to tamper with the device during the execution to cause misclassification. We also discus possible countermeasures to mitigate such attacks.
- Published
- 2022
5. Machine Learning Meets Data Modification: The Potential of Pre-processing for Privacy Enchancement
- Author
-
Batina, L., Bäck, T., Buhan, I., Picek, S., Garofalo, G., Slokom, M., Preuveneers, D., Joosen, W., Larson, M., Batina, L., Bäck, T., Buhan, I., Picek, S., Garofalo, G., Slokom, M., Preuveneers, D., Joosen, W., and Larson, M.
- Abstract
Item does not contain fulltext, We explore how data modification can enhance privacy by examining the connection between data modification and machine learning. Specifically, machine learning “meets” data modification in two ways. First, data modification can protect the data that is used to train machine learning models focusing it on the intended use and inhibiting unwanted inference. Second, machine learning can provide new ways of creating modified data. In this chapter, we discuss data modification approaches, applied during data pre-processing, that are suited for online data sharing scenarios. Specifically, we define two scenarios “User data sharing” and “Data set sharing” and describe the threat models associated with each scenario and related privacy threats. We then survey the landscape of privacy-enhancing data modification techniques that can be used to counter these threats. The picture that emerges is that data modification approaches hold promise to enhance privacy, and can be used alongside of conventional cryptographic approaches. We close with an outlook on future directions focusing on new types of data, the relationship among privacy, and the importance of taking an interdisciplinary approach to data modification for privacy enhancement.
- Published
- 2022
6. Adversarial Machine Learning
- Author
-
Batina, L., Bäck, T., Buhan, I., Picek, S., Hernández-Castro, C.J., Liu, Z., Serban, A.C., Tsingenopoulos, I., Joosen, W., Batina, L., Bäck, T., Buhan, I., Picek, S., Hernández-Castro, C.J., Liu, Z., Serban, A.C., Tsingenopoulos, I., and Joosen, W.
- Abstract
Contains fulltext : 250777.pdf (Publisher’s version ) (Closed access), Recent innovations in machine learning enjoy a remarkable rate of adoption across a broad spectrum of applications, including cyber-security. While previous chapters study the application of machine learning solutions to cyber-security, in this chapter we present adversarial machine learning: a field of study concerned with the security of machine learning algorithms when faced with attackers. Likewise, adversarial machine learning enjoys remarkable interest from the community, with a large body of works that either propose attacks against machine learning algorithms, or defenses against adversarial attacks. In particular, adversarial attacks have been mounted in almost all applications of machine learning. Here, we aim to systematize adversarial machine learning, with a pragmatic focus on common computer security applications. Without assuming a strong background in machine learning, we also introduce the basic building blocks and fundamental properties of adversarial machine learning. This study is therefore accessible both to a security audience without in-depth knowledge of machine learning and to a machine learning audience.
- Published
- 2022
7. Adversarial Machine Learning
- Author
-
Hernández-Castro, C.J., Liu, Z., Serban, A.C., Tsingenopoulos, I., Joosen, W., Batina, L., Bäck, T., Buhan, I., and Picek, S.
- Abstract
Recent innovations in machine learning enjoy a remarkable rate of adoption across a broad spectrum of applications, including cyber-security. While previous chapters study the application of machine learning solutions to cyber-security, in this chapter we present adversarial machine learning: a field of study concerned with the security of machine learning algorithms when faced with attackers. Likewise, adversarial machine learning enjoys remarkable interest from the community, with a large body of works that either propose attacks against machine learning algorithms, or defenses against adversarial attacks. In particular, adversarial attacks have been mounted in almost all applications of machine learning. Here, we aim to systematize adversarial machine learning, with a pragmatic focus on common computer security applications. Without assuming a strong background in machine learning, we also introduce the basic building blocks and fundamental properties of adversarial machine learning. This study is therefore accessible both to a security audience without in-depth knowledge of machine learning and to a machine learning audience.
- Published
- 2022
8. Machine Learning Meets Data Modification: The Potential of Pre-processing for Privacy Enchancement
- Author
-
Garofalo, G., Slokom, M., Preuveneers, D., Joosen, W., Larson, M., Batina, L., Bäck, T., Buhan, I., and Picek, S.
- Subjects
Lecture notes in computer science - Abstract
We explore how data modification can enhance privacy by examining the connection between data modification and machine learning. Specifically, machine learning “meets” data modification in two ways. First, data modification can protect the data that is used to train machine learning models focusing it on the intended use and inhibiting unwanted inference. Second, machine learning can provide new ways of creating modified data. In this chapter, we discuss data modification approaches, applied during data pre-processing, that are suited for online data sharing scenarios. Specifically, we define two scenarios “User data sharing” and “Data set sharing” and describe the threat models associated with each scenario and related privacy threats. We then survey the landscape of privacy-enhancing data modification techniques that can be used to counter these threats. The picture that emerges is that data modification approaches hold promise to enhance privacy, and can be used alongside of conventional cryptographic approaches. We close with an outlook on future directions focusing on new types of data, the relationship among privacy, and the importance of taking an interdisciplinary approach to data modification for privacy enhancement.
- Published
- 2022
9. Deep Learning on Side-Channel Analysis
- Author
-
Krček, M., Li, H., Paguada, S., Rioja, U., Wu, L., Perin, G., Chmielewski, L.M., Batina, L., Bäck, T., Buhan, I., and Picek, S.
- Abstract
This chapter provides an overview of recent applications of deep learning to profiled side-channel analysis (SCA). The advent of deep neural networks (mainly multiple layer perceptrons and convolutional neural networks) as a learning algorithm for profiled SCA opened several new directions and possibilities to explore the occurrence of side-channel leakages from different categories of systems. This is particularly important for designers to verify to what extent an adversary can extract sensitive information when possessing state-of-the-art attack methods. Deep learning is a fast-evolving technology that provides several advantages in profiled SCA and we summarize what are the main directions and results obtained by the research community.
- Published
- 2022
10. Efficient strategies to play the indistinguishability game for fuzzy sketches.
- Author
-
Buhan, I., Guajardo, J., and Kelkboom, E.
- Published
- 2010
- Full Text
- View/download PDF
11. A Survey of the Security and Privacy Measures for Anonymous Biometric Authentication Systems.
- Author
-
Buhan, I., Kelkboom, E., and Simoens, K.
- Published
- 2010
- Full Text
- View/download PDF
12. Guarding the First Order: The Rise of AES Maskings
- Author
-
Askeland, Amund, Dhooghe, Siemen, Nikova, Svetla, Rijmen, Vincent, Zhang, Zhenda, Buhan, I, and Schneider, T
- Subjects
Technology ,Science & Technology ,Computer Science, Information Systems ,AES ,Hardware ,Computer Science, Theory & Methods ,Physical Sciences ,Computer Science ,Mathematics, Applied ,THRESHOLD IMPLEMENTATIONS ,Mathematics ,Probing security - Abstract
ispartof: pages:103-122 ispartof: SMART CARD RESEARCH AND ADVANCED APPLICATIONS, CARDIS 2022 vol:13820 pages:103-122 ispartof: 21st International Conference on Smart Card Research and Advanced Applications (CARDIS) location:ENGLAND, Birmingham date:7 Nov - 9 Nov 2022 status: published
- Published
- 2023
13. On Implementation-Level Security of Edge-Based Machine Learning Models
- Author
-
Batina, Lejla, Bhasin, Shivam, Breier, Jakub, Hou, Xiaolu, Jap, Dirmanto, Batina, L., Bäck, T., Buhan, I., and Picek, S.
- Subjects
Lecture notes in compute science ,Digital Security - Abstract
Item does not contain fulltext In this chapter, we are considering the physical security of Machine Learning (ML) implementations on Edge Devices. We list the state-of-the-art known physical attacks, with the main attack objectives to reverse engineer and misclassify ML models. These attacks have been reported for different target platforms with the usage of both passive and active attacks. The presented works highlight the potential threat of stealing an intellectual property or confidential model trained with private data, and also the possibility to tamper with the device during the execution to cause misclassification. We also discus possible countermeasures to mitigate such attacks.
- Published
- 2022
14. Machine Learning Meets Data Modification
- Author
-
Giuseppe Garofalo, Manel Slokom, Davy Preuveneers, Wouter Joosen, Martha Larson, Batina, L., Bäck, T., Buhan, I., and Picek, S.
- Subjects
Lecture notes in computer science ,Data Science ,Language & Speech Technology ,Language & Communication - Abstract
Item does not contain fulltext We explore how data modification can enhance privacy by examining the connection between data modification and machine learning. Specifically, machine learning “meets” data modification in two ways. First, data modification can protect the data that is used to train machine learning models focusing it on the intended use and inhibiting unwanted inference. Second, machine learning can provide new ways of creating modified data. In this chapter, we discuss data modification approaches, applied during data pre-processing, that are suited for online data sharing scenarios. Specifically, we define two scenarios “User data sharing” and “Data set sharing” and describe the threat models associated with each scenario and related privacy threats. We then survey the landscape of privacy-enhancing data modification techniques that can be used to counter these threats. The picture that emerges is that data modification approaches hold promise to enhance privacy, and can be used alongside of conventional cryptographic approaches. We close with an outlook on future directions focusing on new types of data, the relationship among privacy, and the importance of taking an interdisciplinary approach to data modification for privacy enhancement.
- Published
- 2022
15. Deep Learning on Side-Channel Analysis
- Author
-
Marina Krček, Huimin Li, Servio Paguada, Unai Rioja, Lichao Wu, Guilherme Perin, Łukasz Chmielewski, Batina, L., Bäck, T., Buhan, I., and Picek, S.
- Subjects
Digital Security - Abstract
Item does not contain fulltext This chapter provides an overview of recent applications of deep learning to profiled side-channel analysis (SCA). The advent of deep neural networks (mainly multiple layer perceptrons and convolutional neural networks) as a learning algorithm for profiled SCA opened several new directions and possibilities to explore the occurrence of side-channel leakages from different categories of systems. This is particularly important for designers to verify to what extent an adversary can extract sensitive information when possessing state-of-the-art attack methods. Deep learning is a fast-evolving technology that provides several advantages in profiled SCA and we summarize what are the main directions and results obtained by the research community.
- Published
- 2022
16. Adversarial Machine Learning
- Author
-
Carlos Javier Hernández-Castro, Zhuoran Liu, Alex Serban, Ilias Tsingenopoulos, Wouter Joosen, Batina, L., Bäck, T., Buhan, I., and Picek, S.
- Subjects
Data Science ,Digital Security - Abstract
Contains fulltext : 250777.pdf (Publisher’s version ) (Closed access) Recent innovations in machine learning enjoy a remarkable rate of adoption across a broad spectrum of applications, including cyber-security. While previous chapters study the application of machine learning solutions to cyber-security, in this chapter we present adversarial machine learning: a field of study concerned with the security of machine learning algorithms when faced with attackers. Likewise, adversarial machine learning enjoys remarkable interest from the community, with a large body of works that either propose attacks against machine learning algorithms, or defenses against adversarial attacks. In particular, adversarial attacks have been mounted in almost all applications of machine learning. Here, we aim to systematize adversarial machine learning, with a pragmatic focus on common computer security applications. Without assuming a strong background in machine learning, we also introduce the basic building blocks and fundamental properties of adversarial machine learning. This study is therefore accessible both to a security audience without in-depth knowledge of machine learning and to a machine learning audience.
- Published
- 2022
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.