Search Results - "Yilmaz, Baki Berkay"

Refine Results
  1. 1

    Quantifying information leakage in a processor caused by the execution of instructions by Berkay Yilmaz, Baki, Callan, Robert, Prvulovic, Milos, Zajic, Alenka

    “…Covert/side channel attacks based on electromagnetic (EM) emanations are difficult to detect because they are practiced wirelessly. Hence, quantifying…”
    Get full text
    Conference Proceeding
  2. 2

    A generalized approach to estimation of memoryless covert channel information leakage capacity by Yilmaz, Baki Berkay, Sehatbakhsh, Nader, Dey, Moumita, Cheng, Chia-Lin, Prvulovic, Milos, Zajić, Alenka

    Published in Array (New York) (01-07-2022)
    “…Estimating the amount of information that is leaked by covert channels is a necessity to comprehend and mitigate the severity of attacks exploiting these…”
    Get full text
    Journal Article
  3. 3

    Electromagnetic Side Channel Information Leakage Created by Execution of Series of Instructions in a Computer Processor by Yilmaz, Baki Berkay, Prvulovic, Milos, Zajic, Alenka

    “…The side-channel leakage is a consequence of program execution in a computer processor, and understanding relationship between code execution and information…”
    Get full text
    Journal Article
  4. 4

    PRIMER: Profiling Interrupts using Electromagnetic Side-Channel for Embedded Devices by Dey, Moumita, Yilmaz, Baki Berkay, Prvulovic, Milos, Zajic, Alenka

    Published in IEEE transactions on computers (01-08-2022)
    “…Recent proliferation of CPS and IoT devices has led to an increasing demand for analyzing performance and timing of event-driven computational activity,…”
    Get full text
    Journal Article
  5. 5

    Communication Model and Capacity Limits of Covert Channels Created by Software Activities by Yilmaz, Baki Berkay, Sehatbakhsh, Nader, Zajic, Alenka, Prvulovic, Milos

    “…It has been shown that digital and/or analog characteristics of electronic devices during executing programs can create a side-channel which an attacker can…”
    Get full text
    Journal Article
  6. 6

    Compressed Training Based Massive MIMO by Yilmaz, Baki Berkay, Erdogan, Alper T.

    Published in IEEE transactions on signal processing (01-03-2019)
    “…Massive multiple-input-multiple-output (MIMO) scheme promises high spectral efficiency through the employment of large scale antenna arrays in base stations…”
    Get full text
    Journal Article
  7. 7

    PITEM: Permutations-Based Instruction Tracking Via Electromagnetic Side-Channel Signal Analysis by Ugurlu, Elvan Mert, Yilmaz, Baki Berkay, Zajic, Alenka, Prvulovic, Milos

    Published in IEEE transactions on computers (01-05-2022)
    “…The emergence of cyber-physical systems (CPS) and internet of things (IoT) devices impose significant security and privacy concerns that necessitate robust…”
    Get full text
    Journal Article
  8. 8

    Leveraging EM Side-Channels for Recognizing Components on a Motherboard by Werner, Frank T., Yilmaz, Baki Berkay, Prvulovic, Milos, Zajic, Alenka

    “…This article proposes leveraging EM side-channels to recognize/authenticate electronic components integrated onto a motherboard. By focusing on components on a…”
    Get full text
    Journal Article
  9. 9

    Capacity of the EM Covert/Side-Channel Created by the Execution of Instructions in a Processor by Yilmaz, Baki Berkay, Callan, Robert L., Prvulovic, Milos, Zajic, Alenka

    “…The goal of this paper is to answer how much information is "transmitted" by the execution of particular sequence of instructions in a processor. Introducing…”
    Get full text
    Journal Article
  10. 10

    MarCNNet: A Markovian Convolutional Neural Network for Malware Detection and Monitoring Multi-Core Systems by Yilmaz, Baki Berkay, Werner, Frank, Park, Sunjae Y., Ugurlu, Elvan Mert, Jorgensen, Erik, Prvulovic, Milos, Zajic, Alenka

    Published in IEEE transactions on computers (01-04-2023)
    “…Leveraging side-channels enables zero-overhead detection of anomalies. These channels offer a non-instrumented program profiling capability by means of the…”
    Get full text
    Journal Article
  11. 11

    EMSim: A Microarchitecture-Level Simulation Tool for Modeling Electromagnetic Side-Channel Signals by Sehatbakhsh, Nader, Yilmaz, Baki Berkay, Zajic, Alenka, Prvulovic, Milos

    “…Side-channel attacks have become a serious security concern for computing systems, especially for embedded devices, where the device is often located in, or in…”
    Get full text
    Conference Proceeding
  12. 12

    A New Side-Channel Vulnerability on Modern Computers by Exploiting Electromagnetic Emanations from the Power Management Unit by Sehatbakhsh, Nader, Yilmaz, Baki Berkay, Zajic, Alenka, Prvulovic, Milos

    “…This paper presents a new micro-architectural vulnerability on the power management units of modern computers which creates an electromagnetic-based…”
    Get full text
    Conference Proceeding
  13. 13

    Modelling Jitter in Wireless Channel Created by Processor-Memory Activity by Yilmaz, Baki Berkay, Zajic, Alenka, Prvulovic, Milos

    “…A wireless communication created by a computer software activity is described and modelled. The generation of this communication link is a consequence of…”
    Get full text
    Conference Proceeding
  14. 14

    Detecting Cellphone Camera Status at Distance by Exploiting Electromagnetic Emanations by Yilmaz, Baki Berkay, Ugurlu, Elvan Mert, Prvulovic, Milos, Zajic, Alenka

    “…This paper investigates unintended radiated emissions from cellphones to identify operational status of rear/front camera. We implement a supervised learning…”
    Get full text
    Conference Proceeding
  15. 15

    Capacity of Deliberate Side-Channels Created by Software Activities by Yilmaz, Baki Berkay, Prvulovic, Milos, Zajic, Alenka

    “…It has been shown that electromagnetic (EM) emanations that are result of instruction executions in a computer system can create a wireless side-channel which…”
    Get full text
    Conference Proceeding
  16. 16

    Channel Estimation for Massive MIMO: A Semiblind Algorithm Exploiting QAM Structure by Yilmaz, Baki Berkay, Erdogan, Alper T.

    “…We introduce a new channel matrix estimation algorithm for Massive MIMO systems to reduce the required pilot symbols. The proposed method is based on Maximum A…”
    Get full text
    Conference Proceeding
  17. 17

    Single carrier frequency domain compressed training adaptive equalization by Yilmaz, Baki Berkay, Erdogan, Alper Tunga

    “…Compressed training approach offers to improve the spectral efficiency by significantly reducing the required training length. It is based on a convex…”
    Get full text
    Conference Proceeding
  18. 18

    Cell-Phone Classification: A Convolutional Neural Network Approach Exploiting Electromagnetic Emanations by Yilmaz, Baki Berkay, Mert Ugurlu, Elvan, Zajic, Alenka, Prvulovic, Milos

    “…In this paper, we propose a methodology to identify both the brand of a cell-phone, and the status of its camera by exploiting electromagnetic (EM) emanations…”
    Get full text
    Conference Proceeding
  19. 19

    A Novel Golden-Chip-Free Clustering Technique Using Backscattering Side Channel for Hardware Trojan Detection by Nguyen, Luong N., Yilmaz, Baki Berkay, Prvulovic, Milos, Zajic, Alenka

    “…Over the past few years, malicious hardware modifications, a.k.a. hardware Trojans (HT), have emerged as a major security threat because integrated circuit…”
    Get full text
    Conference Proceeding
  20. 20

    Capacity of EM Side Channel Created by Instruction Executions in a Processor by Yilmaz, Baki Berkay, Prvulovic, Milos, Zajic, Alenka

    “…This paper proposes a methodology to estimate leakage capacity of electromagnetic (EM) side channels created by execution of instruction sequences (e.g. a…”
    Get full text
    Conference Proceeding