Xiaolu Hou
Xiaolu Hou
Physical Analysis & Cryptography Engineering (PACE) Lab, Nanyang Technological University
Verified email at e.ntu.edu.sg - Homepage
Title
Cited by
Cited by
Year
Deeplaser: Practical fault attack on deep neural networks
J Breier, X Hou, D Jap, L Ma, S Bhasin, Y Liu
arXiv preprint arXiv:1806.05859, 2018
372018
Practical fault attack on deep neural networks
J Breier, X Hou, D Jap, L Ma, S Bhasin, Y Liu
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
252018
Fault attacks made easy: differential fault analysis automation on assembly code
J Breier, X Hou, Y Liu
IACR Transactions on Cryptographic Hardware and Embedded Systems, 96-122, 2018
162018
Feeding Two Cats with One Bowl: On Designing a Fault and Side-Channel Resistant Software Encoding Scheme
J Breier, X Hou
Cryptographers’ Track at the RSA Conference, 77-94, 2017
15*2017
A countermeasure against statistical ineffective fault analysis
J Breier, M Khairallah, X Hou, Y Liu
IEEE Transactions on Circuits and Systems II: Express Briefs, 2020
112020
Automated Methods in Cryptographic Fault Analysis
J Breier, X Hou, S Bhasin
Springer International Publishing, 2019
112019
On LCD codes and lattices
X Hou, F Oggier
Information Theory (ISIT), 2016 IEEE International Symposium on, 1501-1505, 2016
112016
Hilbert spaces of entire Dirichlet series and composition operators
X Hou, B Hu, LH Khoi
Journal of Mathematical Analysis and Applications 401 (1), 416-429, 2013
92013
Fully Automated Differential Fault Analysis on Software Implementations of Block Ciphers
X Hou, J Breier, F Zhang, Y Liu
IACR Transactions on Cryptographic Hardware and Embedded Systems, 1-29, 2019
82019
Fully automated differential fault analysis on software implementations of block ciphers
X Hou, J Breier, F Zhang, Y Liu
IACR Transactions on Cryptographic Hardware and Embedded Systems, 1-29, 2019
82019
Construction and Secrecy Gain of a Family of 5-modular Lattices
X Hou, F Lin, F Oggier
2014 IEEE Information Theory Workshop (ITW 2014), 117-121, 2014
82014
On Evaluating Fault Resilient Encoding Schemes in Software
J Breier, X Hou, Y Liu
IEEE Transactions on Dependable and Secure Computing, 2019
7*2019
Some properties of composition operators on entire Dirichlet series with real frequencies
X Hou, LH Khoi
Comptes Rendus Mathematique 350 (3), 149-152, 2012
62012
SNIFF: Reverse Engineering of Neural Networks with Fault Attacks
J Breier, D Jap, X Hou, S Bhasin, Y Liu
arXiv preprint arXiv:2002.11021, 2020
42020
Location Proximity Attacks Against Mobile Targets: Analytical Bounds and Attacker Strategies
X Wang, X Hou, R Rios, P Hallgren, NO Tippenhauer, M Ochoa
European Symposium on Research in Computer Security, 373-392, 2018
42018
Modular Lattices from a Variation of Construction A over Number Fields
X Hou, F Oggier
arXiv preprint arXiv:1604.01583, 2016
42016
SoK: On DFA Vulnerabilities of Substitution-Permutation Networks
M Khairallah, X Hou, Z Najm, J Breier, S Bhasin, T Peyrin
Proceedings of the 2019 ACM Asia Conference on Computer and Communications …, 2019
32019
On Side-Channel Vulnerabilities of Bit Permutations: Key Recovery and Reverse Engineering.
J Breier, D Jap, X Hou, S Bhasin
IACR Cryptol. ePrint Arch. 2018, 219, 2018
32018
Experimental Evaluation of Deep Neural Network Resistance Against Fault Injection Attacks.
X Hou, J Breier, D Jap, L Ma, S Bhasin, Y Liu
IACR Cryptol. ePrint Arch. 2019, 461, 2019
22019
On Side Channel Vulnerabilities of Bit Permutations in Cryptographic Algorithms
J Breier, D Jap, X Hou, S Bhasin
IEEE Transactions on Information Forensics and Security 15, 1072-1085, 2019
12019
The system can't perform the operation now. Try again later.
Articles 1–20