Get busy living… or get busy dying. —— The Shawshank Redemption
Publications
News
Our paper Making Obfuscated PUFs Secure Against Power Side-Channel Based Modeling Attacks has been accepted by DATE 2021, which will be held on February 01 – 05, 2021, Virtual Conference & Exhibition.
Our paper Optimizing Inner Product Masking Scheme by A Coding Theory Approach has been selected to the finalist of CSAW Applied Research Competition, Europe region. See here for full list of finalist.
- We propose a new unified leakage quantitation approach for Generalized code-based masking. All results are publically available on Github. In particular, we present the optimal linear codes for SSS (Shamir’s Secret Sharing scheme)-based polynomial masking in three scenarios:
Our paper Cross-PUF Attacks on Arbiter-PUFs through their Power Side-Channel has been accepted as a short paper by the 51st International Test Conference (ITC), which will be held on November 3 – 5, 2020, Washington DC, USA.
- Our paper Optimizing Inner Product Masking Scheme by A Coding Theory Approach has been accepted by IEEE Transactions on Information Forensics and Security (T-IFS).
Main results on selecting optimal linear codes for IPM are publicly available on Github. Specifically, four takeaway results can be found directly: Our paper Mind the Balance: Revealing the Vulnerabilities in Low Entropy Masking Schemes has been accepted by IEEE Transactions on Information Forensics and Security (T-IFS).
- Our extended paper Detecting Faults in Inner Product Masking Scheme - IPM-FD: IPM with Fault Detection (Extended version*) has been accepted as a special issue by JCEN (The Journal of Cryptographic Engineering).
2021
- Trevor Kroeger, Wei Cheng, Jean Luc Danger, Sylvain Guilley and Naghmeh Karimi. Making Obfuscated PUFs Secure Against Power Side-Channel Based Modeling Attacks. DATE 2021. To appear. [Online link]
2020
Trevor Kroeger, Wei Cheng, Jean Luc Danger, Sylvain Guilley and Naghmeh Karimi. Effect of Aging on PUF Modeling Attacks based on Power Side-Channel Observations. DATE 2020 : 454–459. [Online link]
Yiwen Gao, Yongbin Zhou, Wei Cheng. Efficient electro-magnetic analysis of a GPU bitsliced AES implementation. Cybersecurity 3, 3 (2020). [Online link, BibTeX]
Wei Cheng, Claude Carlet, Kouassi Goli, Jean-Luc Danger and Sylvain Guilley. Detecting Faults in Inner Product Masking Scheme - IPM-FD: IPM with Fault Detection (Extended version*). J Cryptogr Eng (2020) : 1–15. [Online link, Cite]
Jingdian Ming, Yongbin Zhou, Wei Cheng, Huizhong Li, Guang Yang and Qian Zhang. Mind the Balance: Revealing the Vulnerabilities in Low Entropy Masking Schemes. IEEE Transactions on Information Forensics and Security (T-IFS), vol. 15, pp. 3694–3708, 2020. [Online link]
Wei Cheng, Sylvain Guilley, Claude Carlet, Sihem Mesnager and Jean-Luc Danger. Optimizing Inner Product Masking Scheme by A Coding Theory Approach. IEEE Transactions on Information Forensics and Security (T-IFS) , vol. 16, pp. 220–235, 2021. [Online link, ePrint]
Trevor Kroeger, Wei Cheng, Jean Luc Danger, Sylvain Guilley and Naghmeh Karimi. Cross-PUF Attacks on Arbiter-PUFs through their Power Side-Channel. ITC 2020, xxx–xxx (short paper). To appear. [Online link]
2019
- Wei Cheng, Claude Carlet, Kouassi Goli, Jean-Luc Danger and Sylvain Guilley. Detecting Faults in Inner Product Masking Scheme - IPM-FD: IPM with Fault Detection. PROOFS 2019 : 1-16. [Online link, Full version, Slides, BibTeX]
2018
Qian Zhang, Yongbin Zhou, Shuang Qiu, Wei Cheng, Jingdian Ming and Rui Zhang. A Compact AES Hardware Implementation Secure Against 1st-Order Side-Channel Attacks. ICCD 2018 : 545-552. [Online link, Full version, BibTeX]
Yiwen Gao, Wei Cheng, Hailong Zhang and Yongbin Zhou. Cache-Collision Attacks on GPU-Based AES Implementation with Electro-Magnetic Leakages. TrustCom/BigDataSE 2018 : 300-306. [Online link, Full version, BibTeX]
Yiwen Gao, Hailong Zhang, Wei Cheng, Yongbin Zhou and Yuchen Cao. Electro-magnetic analysis of GPU-based AES implementation. DAC 2018 : 121:1-121:6. [Online link, Full version, Poster, BibTeX]
Yiwen Gao, Yongbin Zhou and Wei Cheng. How Does Strict Parallelism Affect Security? A Case Study on the Side-Channel Attacks against GPU-based Bitsliced AES Implementation. IACR Cryptology ePrint Archive 2018: 1080 (2018). [Online link, Full version, BibTeX]
Jingdian Ming, Wei Cheng, Huizhong Li, Guang Yang, Yongbin Zhou and Qian Zhang. Achilles’ Heel: the Unbalanced Mask Sets May Destroy a Masking Countermeasure. IACR Cryptology ePrint Archive 2018: 745 (2018). [Online link, Full version, BibTeX]
2017
Wei Cheng, Chao Zheng, Yuchen Cao, Yongbin Zhou, Hailong Zhang, Sylvain Guilley and Laurent Sauvage. How Far Can We Reach? Breaking RSM-Masked AES-128 Implementation Using Only One Trace. IACR Cryptology ePrint Archive 2017: 1144 (2017). [Online link, Full version, BibTeX]
Changhai Ou, Degang Sun, Zhu Wang, Xinping Zhou and Wei Cheng. Manifold Learning Towards Masking Implementations: A First Study. IACR Cryptology ePrint Archive 2017: 1112 (2017). [Online link, Full version, BibTeX]
2016
- Wei Cheng, Yongbin Zhou and Laurent Sauvage. Differential Fault Analysis on Midori. ICICS 2016 : 307-317. [Online link, Full version, BibTeX]