Artificial Intelligence (AI) trust framework and maturity model: applying an entropy lens to improve security, privacy, and ethical AI

M Mylrea, N Robinson - Entropy, 2023 - mdpi.com
Recent advancements in artificial intelligence (AI) technology have raised concerns about
the ethical, moral, and legal safeguards. There is a pressing need to improve metrics for …

Exploring feature selection scenarios for deep learning-based side-channel analysis

G Perin, L Wu, S Picek - IACR Transactions on Cryptographic …, 2022 - research.tudelft.nl
One of the main promoted advantages of deep learning in profiling side-channel analysis is
the possibility of skipping the feature engineering process. Despite that, most recent …

From improved leakage detection to the detection of points of interests in leakage traces

F Durvaux, FX Standaert - … in Cryptology–EUROCRYPT 2016: 35th Annual …, 2016 - Springer
Leakage detection usually refers to the task of identifying data-dependent information in side-
channel measurements, independent of whether this information can be exploited. Detecting …

Strength in numbers: Improving generalization with ensembles in machine learning-based profiled side-channel analysis

G Perin, Ł Chmielewski, S Picek - IACR Transactions on …, 2020 - tches.iacr.org
The adoption of deep neural networks for profiled side-channel attacks provides powerful
options for leakage detection and key retrieval of secure products. When training a neural …

Neural network based attack on a masked implementation of AES

R Gilmore, N Hanley, M O'Neill - 2015 IEEE International …, 2015 - ieeexplore.ieee.org
Masked implementations of cryptographic algorithms are often used in commercial
embedded cryptographic devices to increase their resistance to side channel attacks. In this …

A formal study of power variability issues and side-channel attacks for nanoscale devices

M Renauld, FX Standaert, N Veyrat-Charvillon… - Advances in Cryptology …, 2011 - Springer
Variability is a central issue in deep submicron technologies, in which it becomes
increasingly difficult to produce two chips with the same behavior. While the impact of …

SIDS: A federated learning approach for intrusion detection in IoT using Social Internet of Things

M Amiri-Zarandi, RA Dara, X Lin - Computer Networks, 2023 - Elsevier
Abstract The Internet of Things (IoT) ecosystem needs Intrusion Detection Systems (IDS) to
mitigate cyberattacks and exploit security vulnerabilities. Over the past years, utilizing …

One for all–all for one: unifying standard differential power analysis attacks

S Mangard, E Oswald, FX Standaert - IET Information Security, 2011 - IET
In this study, the authors examine the relationship between and the efficiency of different
approaches to standard (univariate) differential power analysis (DPA) attacks. The authors …

Applications of machine learning techniques in side-channel attacks: a survey

B Hettwer, S Gehrer, T Güneysu - Journal of Cryptographic Engineering, 2020 - Springer
With increasing expansion of the Internet of Things, embedded devices equipped with
cryptographic modules become an important factor to protect sensitive data. Even though …

Horizontal correlation analysis on exponentiation

C Clavier, B Feix, G Gagnerot, M Roussellet… - … Conference, ICICS 2010 …, 2010 - Springer
We introduce in this paper a technique in which we apply correlation analysis using only
one execution power curve during an exponentiation to recover the whole secret exponent …