Search Results - "Yilmaz, Baki Berkay"
-
1
Quantifying information leakage in a processor caused by the execution of instructions
Published in MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM) (01-10-2017)“…Covert/side channel attacks based on electromagnetic (EM) emanations are difficult to detect because they are practiced wirelessly. Hence, quantifying…”
Get full text
Conference Proceeding -
2
A generalized approach to estimation of memoryless covert channel information leakage capacity
Published in Array (New York) (01-07-2022)“…Estimating the amount of information that is leaked by covert channels is a necessity to comprehend and mitigate the severity of attacks exploiting these…”
Get full text
Journal Article -
3
Electromagnetic Side Channel Information Leakage Created by Execution of Series of Instructions in a Computer Processor
Published in IEEE transactions on information forensics and security (2020)“…The side-channel leakage is a consequence of program execution in a computer processor, and understanding relationship between code execution and information…”
Get full text
Journal Article -
4
PRIMER: Profiling Interrupts using Electromagnetic Side-Channel for Embedded Devices
Published in IEEE transactions on computers (01-08-2022)“…Recent proliferation of CPS and IoT devices has led to an increasing demand for analyzing performance and timing of event-driven computational activity,…”
Get full text
Journal Article -
5
Communication Model and Capacity Limits of Covert Channels Created by Software Activities
Published in IEEE transactions on information forensics and security (2020)“…It has been shown that digital and/or analog characteristics of electronic devices during executing programs can create a side-channel which an attacker can…”
Get full text
Journal Article -
6
Compressed Training Based Massive MIMO
Published in IEEE transactions on signal processing (01-03-2019)“…Massive multiple-input-multiple-output (MIMO) scheme promises high spectral efficiency through the employment of large scale antenna arrays in base stations…”
Get full text
Journal Article -
7
PITEM: Permutations-Based Instruction Tracking Via Electromagnetic Side-Channel Signal Analysis
Published in IEEE transactions on computers (01-05-2022)“…The emergence of cyber-physical systems (CPS) and internet of things (IoT) devices impose significant security and privacy concerns that necessitate robust…”
Get full text
Journal Article -
8
Leveraging EM Side-Channels for Recognizing Components on a Motherboard
Published in IEEE transactions on electromagnetic compatibility (01-04-2021)“…This article proposes leveraging EM side-channels to recognize/authenticate electronic components integrated onto a motherboard. By focusing on components on a…”
Get full text
Journal Article -
9
Capacity of the EM Covert/Side-Channel Created by the Execution of Instructions in a Processor
Published in IEEE transactions on information forensics and security (01-03-2018)“…The goal of this paper is to answer how much information is "transmitted" by the execution of particular sequence of instructions in a processor. Introducing…”
Get full text
Journal Article -
10
MarCNNet: A Markovian Convolutional Neural Network for Malware Detection and Monitoring Multi-Core Systems
Published in IEEE transactions on computers (01-04-2023)“…Leveraging side-channels enables zero-overhead detection of anomalies. These channels offer a non-instrumented program profiling capability by means of the…”
Get full text
Journal Article -
11
EMSim: A Microarchitecture-Level Simulation Tool for Modeling Electromagnetic Side-Channel Signals
Published in 2020 IEEE International Symposium on High Performance Computer Architecture (HPCA) (01-02-2020)“…Side-channel attacks have become a serious security concern for computing systems, especially for embedded devices, where the device is often located in, or in…”
Get full text
Conference Proceeding -
12
A New Side-Channel Vulnerability on Modern Computers by Exploiting Electromagnetic Emanations from the Power Management Unit
Published in 2020 IEEE International Symposium on High Performance Computer Architecture (HPCA) (01-02-2020)“…This paper presents a new micro-architectural vulnerability on the power management units of modern computers which creates an electromagnetic-based…”
Get full text
Conference Proceeding -
13
Modelling Jitter in Wireless Channel Created by Processor-Memory Activity
Published in 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) (01-04-2018)“…A wireless communication created by a computer software activity is described and modelled. The generation of this communication link is a consequence of…”
Get full text
Conference Proceeding -
14
Detecting Cellphone Camera Status at Distance by Exploiting Electromagnetic Emanations
Published in MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM) (01-11-2019)“…This paper investigates unintended radiated emissions from cellphones to identify operational status of rear/front camera. We implement a supervised learning…”
Get full text
Conference Proceeding -
15
Capacity of Deliberate Side-Channels Created by Software Activities
Published in MILCOM 2018 - 2018 IEEE Military Communications Conference (MILCOM) (01-10-2018)“…It has been shown that electromagnetic (EM) emanations that are result of instruction executions in a computer system can create a wireless side-channel which…”
Get full text
Conference Proceeding -
16
Channel Estimation for Massive MIMO: A Semiblind Algorithm Exploiting QAM Structure
Published in 2019 53rd Asilomar Conference on Signals, Systems, and Computers (01-11-2019)“…We introduce a new channel matrix estimation algorithm for Massive MIMO systems to reduce the required pilot symbols. The proposed method is based on Maximum A…”
Get full text
Conference Proceeding -
17
Single carrier frequency domain compressed training adaptive equalization
Published in 2017 51st Asilomar Conference on Signals, Systems, and Computers (01-10-2017)“…Compressed training approach offers to improve the spectral efficiency by significantly reducing the required training length. It is based on a convex…”
Get full text
Conference Proceeding -
18
Cell-Phone Classification: A Convolutional Neural Network Approach Exploiting Electromagnetic Emanations
Published in ICASSP 2020 - 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) (01-05-2020)“…In this paper, we propose a methodology to identify both the brand of a cell-phone, and the status of its camera by exploiting electromagnetic (EM) emanations…”
Get full text
Conference Proceeding -
19
A Novel Golden-Chip-Free Clustering Technique Using Backscattering Side Channel for Hardware Trojan Detection
Published in 2020 IEEE International Symposium on Hardware Oriented Security and Trust (HOST) (07-12-2020)“…Over the past few years, malicious hardware modifications, a.k.a. hardware Trojans (HT), have emerged as a major security threat because integrated circuit…”
Get full text
Conference Proceeding -
20
Capacity of EM Side Channel Created by Instruction Executions in a Processor
Published in 2019 IEEE 10th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON) (01-10-2019)“…This paper proposes a methodology to estimate leakage capacity of electromagnetic (EM) side channels created by execution of instruction sequences (e.g. a…”
Get full text
Conference Proceeding