I choose you: Automated hyperparameter tuning for deep learning-based side-channel analysis

L Wu, G Perin, S Picek - IEEE Transactions on Emerging …, 2022 - ieeexplore.ieee.org
Today, the deep learning-based side-channel analysis represents a widely researched
topic, with numerous results indicating the advantages of such an approach. Indeed …

Power side-channel attack analysis: A review of 20 years of study for the layman

M Randolph, W Diehl - Cryptography, 2020 - mdpi.com
Physical cryptographic implementations are vulnerable to so-called side-channel attacks, in
which sensitive information can be recovered by analyzing physical phenomena of a device …

Ridge-based DPA: Improvement of differential power analysis for nanoscale chips

W Wang, Y Yu, FX Standaert, J Liu… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Differential power analysis (DPA), as a very practical type of side-channel attacks, has been
widely studied and used for the security analysis of cryptographic implementations …

Make some noise. unleashing the power of convolutional neural networks for profiled side-channel analysis

J Kim, S Picek, A Heuser, S Bhasin… - IACR Transactions on …, 2019 - tches.iacr.org
Profiled side-channel analysis based on deep learning, and more precisely Convolutional
Neural Networks, is a paradigm showing significant potential. The results, although scarce …

Sok: Deep learning-based physical side-channel analysis

S Picek, G Perin, L Mariot, L Wu, L Batina - ACM Computing Surveys, 2023 - dl.acm.org
Side-channel attacks represent a realistic and serious threat to the security of embedded
devices for already almost three decades. A variety of attacks and targets they can be …

The curse of class imbalance and conflicting metrics with machine learning for side-channel evaluations

S Picek, A Heuser, A Jovic, S Bhasin… - IACR Transactions on …, 2019 - tches.iacr.org
We concentrate on machine learning techniques used for profiled sidechannel analysis in
the presence of imbalanced data. Such scenarios are realistic and often occurring, for …

Non-profiled deep learning-based side-channel preprocessing with autoencoders

D Kwon, H Kim, S Hong - IEEE Access, 2021 - ieeexplore.ieee.org
In recent years, deep learning-based side-channel attacks have established their position as
mainstream. However, most deep learning techniques for cryptanalysis mainly focused on …

Neural network based attack on a masked implementation of AES

R Gilmore, N Hanley, M O'Neill - 2015 IEEE International …, 2015 - ieeexplore.ieee.org
Masked implementations of cryptographic algorithms are often used in commercial
embedded cryptographic devices to increase their resistance to side channel attacks. In this …

Side-channel analysis and machine learning: A practical perspective

S Picek, A Heuser, A Jovic, SA Ludwig… - … Joint Conference on …, 2017 - ieeexplore.ieee.org
The field of side-channel analysis has made significant progress over time. Side-channel
analysis is now used in practice in design companies as well as in test laboratories, and the …

The side-channel metrics cheat sheet

K Papagiannopoulos, O Glamočanin… - ACM Computing …, 2023 - dl.acm.org
Side-channel attacks exploit a physical observable originating from a cryptographic device
in order to extract its secrets. Many practically relevant advances in the field of side-channel …