Sok: Deep learning-based physical side-channel analysis

S Picek, G Perin, L Mariot, L Wu, L Batina - ACM Computing Surveys, 2023 - dl.acm.org
Side-channel attacks represent a realistic and serious threat to the security of embedded
devices for already almost three decades. A variety of attacks and targets they can be …

[HTML][HTML] Ensuring cross-device portability of electromagnetic side-channel analysis for digital forensics

L Navanesan, NA Le-Khac, M Scanlon… - Forensic Science …, 2024 - Elsevier
Investigation on smart devices has become an essential subdomain in digital forensics. The
inherent diversity and complexity of smart devices pose a challenge to the extraction of …

Improving side-channel leakage assessment using pre-silicon leakage models

D Shanmugam, P Schaumont - … Side-Channel Analysis and Secure Design, 2023 - Springer
Side-channel leakage assessment is an essential tool in the security evaluation of new chip
designs. Pre-silicon side-channel analysis tools have made significant progress in …

Systemization of Knowledge (SoK)-Cross Impact of Transfer Learning in Cybersecurity: Offensive, Defensive and Threat Intelligence Perspectives

S Makar, A Dehghantanha, F Zarrinkalam… - arXiv preprint arXiv …, 2023 - arxiv.org
Recent literature highlights a significant cross-impact between transfer learning and
cybersecurity. Many studies have been conducted on using transfer learning to enhance …

Optimization Technique for Deep Learning Methodology on Power Side Channel Attacks

AA Ahmed, MK Hasan, NS Nafi… - 2023 33rd …, 2023 - ieeexplore.ieee.org
The first non-profiled side-channel attack (SCA) method using deep learning is Timon's
Differential Deep Learning Analysis (DDLA). This method is effective in retrieving the secret …

Train or adapt a deeply learned profile?

C Genevey-Metat, A Heuser, B Gérard - Progress in Cryptology …, 2021 - Springer
In recent years, many papers have shown that deep learning can be beneficial for profiled
side-channel analysis. However, to obtain good performance with deep learning, an …

Keep it unbiased: A comparison between estimation of distribution algorithms and deep learning for human interaction-free side-channel analysis

U Rioja, L Batina, I Armendariz, JL Flores - Journal of Cryptographic …, 2023 - Springer
Evaluating side-channel analysis (SCA) security is a complex process, involving applying
several techniques whose success depends on human engineering. Therefore, it is crucial …

Ensuring Cross-Device Portability of Electromagnetic Side-Channel Analysis

L Navanesana, NA Le-Khac, M Scanlon… - arXiv preprint arXiv …, 2023 - arxiv.org
Investigation on smart devices has become an essential subdomain in digital forensics. The
inherent diversity and complexity of smart devices pose a challenge to the extraction of …

Power Analysis Side-Channel Attacks on Same and Cross-Device Settings: A Survey of Machine Learning Techniques

A Ghimire, VV Baligodugula, F Amsaad - IFIP International Internet of …, 2023 - Springer
Abstract Systems that use secret keys or personal details are seriously at risk from side-
channel attacks, especially if they rely on power analysis. Attackers can use unintentional …

A transfer learning approach for electromagnetic side-channel attack and evaluation

M Fang, B Mao, W Hu - 2022 7th International Conference on …, 2022 - ieeexplore.ieee.org
Side channel analysis has posed a huge threat to cryptographic function security. And some
mitigation techniques including masking and trace data desynchronization are used to …