关注
Michail Moraitis
Michail Moraitis
在 kth.se 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Bitstream modification attack on SNOW 3G
M Moraitis, E Dubrova
2020 Design, Automation & Test in Europe Conference & Exhibition (DATE …, 2020
192020
Can Deep Learning Break a True Random Number Generator?
Y Yu, M Moraitis, E Dubrova
IEEE Transactions on Circuits and Systems II: Express Briefs 68 (5), 1710-1714, 2021
162021
Why deep learning makes it difficult to keep secrets in FPGAs
Y Yu, M Moraitis, E Dubrova
Proceedings of the 2020 Workshop on DYnamic and Novel Advances in Machine …, 2020
16*2020
Attacking Trivium at the bitstream level
K Ngo, E Dubrova, M Moraitis
2020 IEEE 38th International Conference on Computer Design (ICCD), 640-647, 2020
10*2020
FPGA bitstream modification with interconnect in mind
M Moraitis, E Dubrova
Proceedings of the 9th International Workshop on Hardware and Architectural …, 2020
10*2020
Do Not Rely on Clock Randomization: A Side-Channel Attack on a Protected Hardware Implementation of AES
M Brisfors, M Moraitis, E Dubrova
International Symposium on Foundations and Practice of Security, 38-53, 2022
82022
Securing CRYSTALS-Kyber in FPGA using duplication and clock randomization
M Moraitis, Y Ji, M Brisfors, E Dubrova, N Lindskog, H Englund
IEEE Design & Test, 2023
72023
A side-channel resistant implementation of AES combining clock randomization with duplication
M Moraitis, M Brisfors, E Dubrova, N Lindskog, H Englund
2023 IEEE International Symposium on Circuits and Systems (ISCAS), 1-5, 2023
32023
FPGA Design Deobfuscation by Iterative LUT Modification at Bitstream Level
M Moraitis, E Dubrova
Journal of Hardware and Systems Security 7 (1), 11-24, 2023
32023
Breaking ACORN at Bitstream Level
M Moraitis, E Dubrova, K Ngo
2020 IFIP/IEEE 28th International Conference on Very Large Scale Integration …, 2020
32020
FPGA Bitstream Modification: Attacks and Countermeasures
M Moraitis
IEEE Access 11, 127931-127955, 2023
12023
Towards Securing the FPGA Bitstream: Exploiting Vulnerabilities and Implementing Countermeasures
M Moraitis
KTH Royal Institute of Technology, 2024
2024
Attacking and Securing the Clock Randomization and Duplication Side-Channel Attack Countermeasure
M Brisfors, M Moraitis, GK Landin, T Jilborg
International Symposium on Foundations and Practice of Security, 372-387, 2023
2023
Implementation and evaluation of an open source stereo camera
Μ Μωραΐτης
2018
系统目前无法执行此操作,请稍后再试。
文章 1–14