Works (21)

Updated: September 12th, 2023 05:02

2023 article

Hardware-Software Co-design for Side-Channel Protected Neural Network Inference

2023 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST, HOST, pp. 155–166.

author keywords: machine learning inference; side-channel analysis; masking; flexibility
Source: Web Of Science
Added: August 7, 2023

2023 article

SS-AXI: Secure and Safe Access Control Mechanism for Multi-Tenant Cloud FPGAs

2023 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, ISCAS.

By: E. Karabulut n, A. Awad n & A. Aysu n

author keywords: Multi-tenant cloud FPGAs; access control mechanism; memory isolation
Source: Web Of Science
Added: September 11, 2023

2023 journal article

SeqL plus : Secure Scan-Obfuscation With Theoretical and Empirical Validation

IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 42(5), 1406–1410.

author keywords: Flip-flops; Logic gates; Security; Complexity theory; Resists; Resilience; Iterative algorithms; IP piracy; scan-chains; scan-scrambling
Source: Web Of Science
Added: June 5, 2023

2022 journal article

An Extensive Study of Flexible Design Methods for the Number Theoretic Transform

IEEE TRANSACTIONS ON COMPUTERS, 71(11), 2829–2843.

author keywords: NTT; flexible; hardware; HLS; RISC-V
Source: Web Of Science
Added: October 24, 2022

2022 article

Apple vs. EMA Electromagnetic Side Channel Attacks on Apple CoreCrypto

PROCEEDINGS OF THE 59TH ACM/IEEE DESIGN AUTOMATION CONFERENCE, DAC 2022, pp. 247–252.

By: G. Haas n & A. Aysu n

Source: Web Of Science
Added: September 11, 2023

2022 article

FAXID: FPGA-Accelerated XGBoost Inference for Data Centers using HLS

2022 IEEE 30TH INTERNATIONAL SYMPOSIUM ON FIELD-PROGRAMMABLE CUSTOM COMPUTING MACHINES (FCCM 2022), pp. 113–121.

By: A. Gajjar n, P. Kashyap n, A. Aysu n, P. Franzon n, S. Dey* & C. Cheng*

Sources: Web Of Science, ORCID
Added: October 11, 2022

2022 journal article

Guarding Machine Learning Hardware Against Physical Side-channel Attacks

ACM JOURNAL ON EMERGING TECHNOLOGIES IN COMPUTING SYSTEMS, 18(3).

By: A. Dubey n, R. Cammarota*, V. Suresh* & A. Aysu n

author keywords: Side-channel attack; neural networks; masking
Source: Web Of Science
Added: December 5, 2022

2022 article

High-Fidelity Model Extraction Attacks via Remote Power Monitors

2022 IEEE INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE CIRCUITS AND SYSTEMS (AICAS 2022): INTELLIGENT TECHNOLOGY IN THE POST-PANDEMIC ERA, pp. 328–331.

By: A. Dubey n, E. Karabulut n, A. Awad n & A. Aysu n

author keywords: Neural networks; model stealing; time-to-digital converters; secure virtualization
Source: Web Of Science
Added: November 7, 2022

2022 article

Towards AI-Enabled Hardware Security: Challenges and Opportunities

2022 IEEE 28TH INTERNATIONAL SYMPOSIUM ON ON-LINE TESTING AND ROBUST SYSTEM DESIGN (IOLTS 2022).

By: H. Sayadi*, M. Aliasgari*, F. Aydin n, S. Potluri n, A. Aysu n, J. Edmonds*, S. Tehranipoor*

Source: Web Of Science
Added: October 24, 2022

2021 journal article

2Deep: Enhancing Side-Channel Attacks on Lattice-Based Key-Exchange via 2-D Deep Learning

IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 40(6), 1217–1229.

By: P. Kashyap n, F. Aydin n, S. Potluri n, P. Franzon n & A. Aysu n

author keywords: Resistance; Performance evaluation; Deep learning; Protocols; Power measurement; Side-channel attacks; NIST; Cross-device; data-augmentation; deep learning (DL); lattice-based key-exchange protocols; power side channels
Sources: Web Of Science, ORCID
Added: June 10, 2021

2021 article

An Efficient Non-Profiled Side-Channel Attack on the CRYSTALS-Dilithium Post-Quantum Signature

2021 IEEE 39TH INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD 2021), pp. 583–590.

author keywords: Hardware Security; Post-quantum Cryptography; Correlation Power Analysis; Digital Signature; Number Theoretic Transform
Source: Web Of Science
Added: March 28, 2022

2021 journal article

Efficient, Flexible, and Constant-Time Gaussian Sampling Hardware for Lattice Cryptography

IEEE TRANSACTIONS ON COMPUTERS, 71(8), 1810–1823.

By: E. Karabulut n, E. Alkim* & A. Aysu n

author keywords: Hardware; Cryptography; Gaussian distribution; Standards; Timing; Optimization; Encryption; Discrete gaussian sampling; lattice cryptography; FPGA
Source: Web Of Science
Added: July 18, 2022

2021 article

FALCON Down: Breaking FALCON Post-Quantum Signature Scheme through Side-Channel Attacks

2021 58TH ACM/IEEE DESIGN AUTOMATION CONFERENCE (DAC), pp. 691–696.

By: E. Karabulut n & A. Aysu n

author keywords: side-channel attacks; post-quantum cryptography; digital signatures
Source: Web Of Science
Added: March 28, 2022

2021 article

Single-Trace Side-Channel Attacks on omega-Small Polynomial Sampling

2021 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), pp. 35–45.

By: E. Karabulut n, E. Alkim* & A. Aysu n

author keywords: Side-channel attacks; Post-quantum cryptography; NTRU; CRYSTALS-DILITHIUM
Source: Web Of Science
Added: June 13, 2022

2021 article

Stealing Neural Network Models through the Scan Chain: A New Threat for ML Hardware

2021 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER AIDED DESIGN (ICCAD).

By: S. Potluri* & A. Aysu*

Source: Web Of Science
Added: February 21, 2022

2021 article

iTimed: Cache Attacks on the Apple A10 Fusion SoC

2021 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), pp. 80–90.

By: G. Haas n, S. Potluri n & A. Aysu n

Source: Web Of Science
Added: June 13, 2022

2020 article

BoMaNet: Boolean Masking of an Entire Neural Network

2020 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER AIDED-DESIGN (ICCAD).

By: A. Dubey n, R. Cammarota* & A. Aysu n

author keywords: Masking; neural networks; side-channel attacks; model stealing
Source: Web Of Science
Added: August 30, 2021

2020 journal article

High-Level Synthesis of Number-Theoretic Transform: A Case Study for Future Cryptosystems

IEEE EMBEDDED SYSTEMS LETTERS, 12(4), 133–136.

By: E. Ozcan* & A. Aysu n

author keywords: Field programmable gate array (FPGA); hardware design; high-level synthesis (HLS); lattice-based cryptography; post-quantum cryptography
Source: Web Of Science
Added: January 4, 2021

2020 article

Machine Learning and Hardware security: Challenges and Opportunities -Invited Talk

2020 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER AIDED-DESIGN (ICCAD).

By: F. Regazzoni*, S. Bhasin*, A. Pour*, I. Alshaer*, F. Aydin n, A. Aysu n, V. Beroulle*, G. Di Natale* ...

author keywords: machine learning; hardware security
Sources: Web Of Science, ORCID
Added: August 30, 2021

2020 article

RANTT: A RISC-V Architecture Extension for the Number Theoretic Transform

2020 30TH INTERNATIONAL CONFERENCE ON FIELD-PROGRAMMABLE LOGIC AND APPLICATIONS (FPL), pp. 26–32.

By: E. Karabulut n & A. Aysu n

author keywords: Lattice-Based Cryptography; RISC-V; NTT
Source: Web Of Science
Added: August 23, 2021

2019 article

Teaching the Next Generation of Cryptographic Hardware Design to the Next Generation of Engineers

GLSVLSI '19 - PROCEEDINGS OF THE 2019 ON GREAT LAKES SYMPOSIUM ON VLSI, pp. 237–242.

By: A. Aysu n

author keywords: education; hardware security; post-quantum cryptography; FPGA
Source: Web Of Science
Added: July 29, 2019