2023

  • Omid Bazangani, Alexandre Iooss, Ileana Buhan and Lejla Batina, ABBY: Automating the creation of fine-grained leakage models, ASIACCS (to appear) Link to paper
  • Asmita Adhikary, Ileana Buhan SoK: Assisted Fault Simulation - Existing Challenges and Opportunities Offered by AI, AIHWS Link to paper;

2022

  • Servio Paguada, Lejla Batina, Ileana Buhan and Igor Armendariz, “Being Patient and Persistent: Optimizing An Early Stopping Strategy for Deep Learning in Profiled Attacks”, Transactions on Computers, Special Issue on Hardware Security (regular paper), Link to paper;
  • Servio Paguada, Lejla Batina, Ileana Buhan and Igor Armendariz, “Playing with blocks: Toward re-usable deep learning models for side-channel profiled attacks”, IEEE Trans. Inf Forensics & Security 17, 2835-2847 (2022) Link to paper;
  • Lejla Batina, Thomas Bäck, Ileana Buhan, Stjepan Picek, Security and Artificial Intelligence - A Crossdisciplinary Approach LNCS 13049, Springer 2022 [contents]
  • Jurian van Geest, Ileana Buhan, A side-channel based disassembler for the ARM-Cortex M0, AIHWS, LNCS 13285, Springer 2022, Link to paper;
  • Ileana Buhan, Lejla Batina, Yuval Yarom and Patrick Schaumont, SoK: Design Tools for Side-Channel-Aware Implementations, ASIACCS: 756-770, Link;

2021

  • Omid Bazangani, Alexandre Iooss, Ileana Buhan and Lejla Batina, ABBY: Automating the creation of fine-grained leakage models, IACR Cryptology ePrint Archive 2021/1569 (2021)
  • Vipul Arora, Ileana Buhan, Guilherme Perin and Stjepan Picek, A Tale of Two Boards: On the Influence of Microarchitecture on Side-Channel Leakage, CARDIS 2021;
  • Guilherme Perin, Ileana Buhan and Stjepan Picek, Learning when to stop: a mutual information approach to fight overfitting in profiled side-channel_analysis, COSADE 2021;

2020

  • Melissa Azouaoui, Davide Bellizia, Ileana Buhan, Nicolas Debande, Sebastien Duval, Christophe Giraud, Eliane Jaulmes, Francois Koeune, Elisabeth Oswald, Francois-Xavier Standaert and Carolyn Whitnall, A Systematic Appraisal of Side Channel Evaluation Strategies, SSR 2020

2019

  • Yongbo Hu, Yeyang Zheng, Pengwei Feng, Lirui Liu, Chen Zhang, Aron Gohr, Sven Jacob, Werner Schindler, Ileana Buhan, Karim Tobich: Machine learning and side channel analysis in a CTF competition. IACR Cryptology ePrint Archive 2019: 860 (2019)

2016

  • Rauf Mahmudlu, Valentina Banciu, Lejla Batina and Ileana Buhan: LDA-Based Clustering as a Side-Channel Distinguisher. RFIDSec 2016: 62-75, (2016)

2009

  • Ileana Buhan, Bas Boom, Jeroen Doumen, Pieter Hartel and Raymond Veldhuis, Secure Ad-hoc Pairing with Biometrics: SAfE, International Journal of Security and Networks Special (IJSN) Special Issue on Secure Spontaneous Interaction; Vol 4(1-2):2009, Editors: R. Mayrhofer, K. Nyberg, and T. Kindberg;

  • Jeroen Breebaart, Bian Yiang, Ileana Buhan and Cristopher Busch, Biometric Template Protection, The need for open standards, Datenschutz und Datensicherheit-Dud, May 2009, Volume 33, Issue 5, pp 299-304,Viewweg Verlag, Darmstad.

  • Ileana Buhan, Jeroen Breebaart, Jorge Guajardo, Koen de Groet, Emille Kelkboom and Tom Akkermans; A quantitative Analysis of Indistinguishability for a continuous domain biometric cryptosystem; In: Fourth International Workshop on Data Privacy Management (DPM 2009) (to appear); 24-25 September, 2009 Saint Malo France; Lecture Notes in Computer Science, Springer;

  • Ileana Buhan, Secure Information Exchange, Keesing Journal of Documents & Identity (KJD-28), pages (17-19), February, 2009;

2008

  • Ileana Buhan, Cryptographic keys from noisy data, theory and applications, PhD thesis, University of Twente, CTIT Ph.D.-thesis series No. 08-129 ISBN 987-9-03652-738-5; October 2008;

  • Ileana Buhan, Jeroen Doumen, Pieter Hartel, Qiang Tang and Raymond Veldhuis, Embedding Renewable Cryptographic Keys into Continuous Noisy Data, International Journal of Information Security; ICICS 2008, Lecture Notes in Computer Science, vol 5308, Springer, Berlin, Editors: L. Chen; G. Wang; M. Ryan;

  • Buhan, I.R. µand Doumen, J.M. and Hartel, P.H. Controlling Leakage of Biometric Information using Dithering. In: 16th European Signal Processing Conference, 25-29 Aug 2008, Lausanne, Switzerland. 1569105382. EUSIPCO. EURASIP, European Association for Signal, Speech and Image Processing;

  • Buhan, I.R.; Doumen, J.M.; Hartel, P.H.; Tang, Q.; Veldhuis, R.N.J. _Embedding Renewable Cryptographic Keys into Continuous Noisy Data_µ∫. In: 10th International Conference on Information and Communications Security, 20 - 22 October, 2008, Birmingham, UK. pp. 294-310. Lecture Notes in Computer Science 5308. Springer;

  • Bennie Mols, Fotos op mobieltje maken uitwisseling informatie veilig; NRC Handelsblad, 25 Oktober 2008;

2007

  • Buhan, I.R. and Doumen, J.M. and Hartel, P.H. and Veldhuis, R.N.J. (2007) A unifying view on template protection schemes. In: Proceedings of the 28th Symposium on Information Theory in the Benelux, 24-25 May 2007, Enschede, The Netherlands. pp. 35-42. Werkgemeenschap voor Informatie- en Communicatietechniek. ISBN 978-90-365-2509-1.

  • Buhan, I.R. and Doumen, J.M. and Hartel, P.H. and Veldhuis, R.N.J. Secure Ad-hoc Pairing with Biometrics: SAfE. In: First International Workshop on Security for Spontaneous Interaction, 16. September 2007, Innsbruck, Austria. pp. 450-456. Ubicomp 2007 Workshop Proceedings. ISBN 978-3-00-022599-4;

  • Buhan, I.R. and Doumen, J.M. and Hartel, P.H. and Veldhuis, R.N.J. Feeling Is Believing: A Secure Template Exchange Protocol. In: Advances in Biometrics, International Conference (ICB), 27-29 Aug 2007, Seoul, Korea. pp.897-906. Lecture Notes in Computer Science 4642. Springer Verlag. ISBN 978-3-540-74548-8 (Acceptance Rate: 24.2%);

  • Buhan, I.R. and Doumen, J.M. and Hartel, P.H. and Veldhuis, R.N.J. Fuzzy extractors for continuous distributions. In: Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security (ASIACCS), 20-22 March 2007, Singapore. pp. 353-355. ACM. ISBN 1-59593-574-6 (Acceptance Rate: 17.6%);

2005

  • Buhan, I.R. and Bazen, A.M. and Hartel, P.H. and Veldhuis, R.N.J. A False Rejection Oriented Threat Model for the Design of Biometric Authentication Systems(Poster Paper). In: 2nd Int. Conf. on Biometrics (ICB), Hong Kong, China. pp. 728-736. Lecture Notes in Computer Science 3832. Springer-Verlag. ISBN 3-540- 31111-4 (Acceptance Rate: 25.4%);