Skip to main content

Showing 1–3 of 3 results for author: Swierczynski, P

  1. arXiv:2308.08197  [pdf, other

    eess.IV cs.CV

    Self-Reference Deep Adaptive Curve Estimation for Low-Light Image Enhancement

    Authors: Jianyu Wen, Chenhao Wu, Tong Zhang, Yixuan Yu, Piotr Swierczynski

    Abstract: In this paper, we propose a 2-stage low-light image enhancement method called Self-Reference Deep Adaptive Curve Estimation (Self-DACE). In the first stage, we present an intuitive, lightweight, fast, and unsupervised luminance enhancement algorithm. The algorithm is based on a novel low-light enhancement curve that can be used to locally boost image brightness. We also propose a new loss function… ▽ More

    Submitted 10 September, 2023; v1 submitted 16 August, 2023; originally announced August 2023.

  2. Insights into the Mind of a Trojan Designer: The Challenge to Integrate a Trojan into the Bitstream

    Authors: Maik Ender, Pawel Swierczynski, Sebastian Wallat, Matthias Wilhelm, Paul Martin Knopp, Christof Paar

    Abstract: The threat of inserting hardware Trojans during the design, production, or in-field poses a danger for integrated circuits in real-world applications. A particular critical case of hardware Trojans is the malicious manipulation of third-party FPGA configurations. In addition to attack vectors during the design process, FPGAs can be infiltrated in a non-invasive manner after shipment through altera… ▽ More

    Submitted 1 October, 2019; originally announced October 2019.

    Journal ref: ASPDAC 2019 Proceedings of the 24th Asia and South Pacific Design Automation Conference Pages 112-119

  3. Interdiction in Practice -- Hardware Trojan Against a High-Security USB Flash Drive

    Authors: Pawel Swierczynski, Marc Fyrbiak, Philipp Koppe, Amir Moradi, Christof Paar

    Abstract: As part of the revelations about the NSA activities, the notion of interdiction has become known to the public: the interception of deliveries to manipulate hardware in a way that backdoors are introduced. Manipulations can occur on the firmware or at hardware level. With respect to hardware, FPGAs are particular interesting targets as they can be altered by manipulating the corresponding bitstrea… ▽ More

    Submitted 1 October, 2019; originally announced October 2019.

    Journal ref: J Cryptogr Eng (2017) 7: 199