Non-profiled deep learning-based side-channel attacks with sensitivity analysis

B Timon - IACR Transactions on Cryptographic Hardware and …, 2019 - tches.iacr.org
… To carry the attack, we introduce metrics based on Sensitivity Analysis that can reveal both
the secret key value as well as points of interest, such as leakages and masks locations in the …

On the power of fault sensitivity analysis and collision side-channel attacks in a combined setting

A Moradi, O Mischke, C Paar, Y Li, K Ohta… - … and Embedded Systems …, 2011 - Springer
At CHES 2010 two powerful new attacks were presented, namely the Fault Sensitivity Analysis
and the Correlation Collision Attack. This paper shows how these ideas can be combined …

Protecting dilithium against leakage: Revisited sensitivity analysis and improved implementations

M Azouaoui, O Bronchain, G Cassiers… - Cryptology ePrint …, 2022 - eprint.iacr.org
… Based on this, we compare the performance of both deterministic and randomized versions
when sidechannel countermeasures are required. Performances are given for Dilithium with …

New fault-based side-channel attack using fault sensitivity

Y Li, K Ohta, K Sakiyama - IEEE Transactions on Information …, 2011 - ieeexplore.ieee.org
sensitivity analysis (FSA) attack. In the FSA attack, fault injections are used to test out the
sensitive information leakage called fault sensitivitysensitivity and we verify that fault sensitivity

Maxsense: Side-channel sensitivity maximization for trojan detection using statistical test patterns

Y Lyu, P Mishra - ACM Transactions on Design Automation of Electronic …, 2021 - dl.acm.org
… To illustrate how to improve the sensitivity in dynamic current-based side-channel analysis,
we first use a small benchmark c17 from ISCAS-85 [1] as an example with its netlist shown in …

Analyzing and eliminating the causes of fault sensitivity analysis

NF Ghalaty, A Aysu… - 2014 Design, Automation & …, 2014 - ieeexplore.ieee.org
… Fault sensitivity is a condition in which the faulty output begins to show detectable … sensitivity
information during the fault injection, and can later use this information as a side channel

Fault sensitivity analysis at design time

A Barenghi, L Breveglieri, A Palomba… - Trusted computing for …, 2014 - Springer
… A different exploitation of the functionality degradation of a device as a side channel is the
so-called Fault Sensitivity Analysis [17] (FSA). FSA exploits the existing dependence between …

Fault sensitivity analysis

Y Li, K Sakiyama, S Gomisawa, T Fukunaga… - … and Embedded Systems …, 2010 - Springer
… as new side-channel information if it exhibits sensitive-data dependency. Consequently,
we propose a new side-channel analysis FSA that utilizes the leakage of the fault sensitivity to …

A silicon-level countermeasure against fault sensitivity analysis and its evaluation

S Endo, Y Li, N Homma, K Sakiyama… - … Transactions on Very …, 2014 - ieeexplore.ieee.org
Side-channel attacks (SCAs) can retrieve the secret information in those devices by
collecting and analysing the leakage information from side channels. The most studied side-channel

New methods of template attack based on fault sensitivity analysis

Q Wang, A Wang, G Qu, G Zhang - IEEE transactions on multi …, 2017 - ieeexplore.ieee.org
… Sakiyama, “On the power of fault sensitivity analysis and collision sidechannel attacks in a
combined setting,” in Proc. Int. Workshop Cryptographic Hardware Embedded Syst., 2011, pp. …