Sok: Deep learning-based physical side-channel analysis

S Picek, G Perin, L Mariot, L Wu, L Batina - ACM Computing Surveys, 2023 - dl.acm.org
Side-channel attacks represent a realistic and serious threat to the security of embedded
devices for already almost three decades. A variety of attacks and targets they can be …

Adversarial interference and its mitigations in privacy-preserving collaborative machine learning

D Usynin, A Ziller, M Makowski, R Braren… - Nature Machine …, 2021 - nature.com
Despite the rapid increase of data available to train machine-learning algorithms in many
domains, several applications suffer from a paucity of representative and diverse data. The …

Methodology for efficient CNN architectures in profiling attacks

G Zaid, L Bossuet, A Habrard, A Venelli - IACR Transactions on …, 2020 - tches.iacr.org
The side-channel community recently investigated a new approach, based on deep
learning, to significantly improve profiled attacks against embedded systems. Previous …

A comprehensive study of deep learning for side-channel analysis

L Masure, C Dumas, E Prouff - IACR Transactions on Cryptographic …, 2020 - tches.iacr.org
Recently, several studies have been published on the application of deep learning to
enhance Side-Channel Attacks (SCA). These seminal works have practically validated the …

Exploring feature selection scenarios for deep learning-based side-channel analysis

G Perin, L Wu, S Picek - IACR Transactions on Cryptographic …, 2022 - research.tudelft.nl
One of the main promoted advantages of deep learning in profiling side-channel analysis is
the possibility of skipping the feature engineering process. Despite that, most recent …

Strength in numbers: Improving generalization with ensembles in machine learning-based profiled side-channel analysis

G Perin, Ł Chmielewski, S Picek - IACR Transactions on …, 2020 - tches.iacr.org
The adoption of deep neural networks for profiled side-channel attacks provides powerful
options for leakage detection and key retrieval of secure products. When training a neural …

Mind the portability: A warriors guide through realistic profiled side-channel analysis

S Bhasin, A Chattopadhyay, A Heuser… - NDSS 2020-Network …, 2020 - inria.hal.science
Profiled side-channel attacks represent a practical threat to digital devices, thereby having
the potential to disrupt the foundation of e-commerce, the Internet of Things (IoT), and smart …

[PDF][PDF] 密码产品的侧信道分析与评估

陈华, 习伟, 范丽敏, 焦志鹏, 冯婧怡 - 电子与信息学报, 2020 - jeit.ac.cn
作为一类重要的信息安全产品, 密码产品中所使用的密码技术保障了信息的保密性,
完整性和不可抵赖性. 而侧信道攻击是针对密码产品的一类重要的安全威胁 …

SCAUL: Power side-channel analysis with unsupervised learning

K Ramezanpour, P Ampadu… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Existing power analysis techniques rely on strong adversary models with prior knowledge of
the leakage or training data. We introduce side-channel analysis with unsupervised learning …

Side-channel countermeasures' dissection and the limits of closed source security evaluations

O Bronchain, FX Standaert - IACR Transactions on Cryptographic …, 2020 - tches.iacr.org
We take advantage of a recently published open source implementation of the AES
protected with a mix of countermeasures against side-channel attacks to discuss both the …