Leakage detection with the x2-test

A Moradi, B Richter, T Schneider… - IACR Transactions on …, 2018 - tches.iacr.org
We describe how Pearson's χ 2-test can be used as a natural complement to Welch's t-test
for black box leakage detection. In particular, we show that by using these two tests in …

[图书][B] Side-channel analysis of embedded systems

M Ouladj, S Guilley - 2021 - Springer
As shown previously in Sect. 3.2. 3, the Correlation Power Analysis (CPA) is a method that
allows to recover the secret information concealed in embedded devices [1]. It consists in …

Preprocessing of the physical leakage information to combine side-channel distinguishers

S Seçkiner, S Köse - IEEE Transactions on Very Large Scale …, 2021 - ieeexplore.ieee.org
The security and privacy of modern computing devices have become an important design
metric with the unprecedented increase in the amount of personal information stored in the …

A highly efficient side channel attack with profiling through relevance-learning on physical leakage information

AA Pammu, KS Chong, Y Wang… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
We propose a Profiling through Relevance-Learning (PRL) technique on Physical Leakage
Information (PLI) to extract highly correlated PLI with processed data, as to achieve a highly …

Polynomial direct sum masking to protect against both SCA and FIA

C Carlet, A Daif, S Guilley, C Tavernier - Journal of Cryptographic …, 2019 - Springer
Side-channel attacks (SCAs) and fault injection attacks (FIAs) allow an opponent to have
partial access to the internal behavior of the hardware. Since the end of the 1990s, many …

Spectral approach to process the (multivariate) high-order template attack against any masking scheme

M Ouladj, S Guilley, P Guillot, F Mokrane - Journal of Cryptographic …, 2022 - Springer
Cryptographic software is particularly vulnerable to side-channel attacks when programmed
in embedded devices. Indeed, the leakage is particularly intense compared to the noise …

Security evaluation against side-channel analysis at compilation time

N Bruneau, C Christen, JL Danger, A Facon… - Algebra, Codes and …, 2019 - Springer
Masking countermeasure is implemented to thwart side-channel attacks. The maturity of
high-order masking schemes has reached the level where the concepts are sound and …

Combined Side-Channel Attacks on a Lightweight Prince Cipher Implementation

S Seçkiner, S Köse - 2021 IEEE 34th International System-on …, 2021 - ieeexplore.ieee.org
Side-channel attacks have recently become one of primary threats that target modern
computing devices. Several techniques have been proposed to improve the strength of side …

[PDF][PDF] Variety of scalable shuffling countermeasures against side channel attacks

N Veshchikov, SF Medeiros… - Journal of Cyber …, 2016 - journals.riverpublishers.com
IoT devices have very strong requirements on all the resources such as memory,
randomness, energy and execution time. This paper proposes a number of scalable …

Information entropy-based leakage profiling

C Ou, X Zhou, SK Lam, C Zhou… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
An accurate leakage model is critical to side-channel attacks and evaluations. Leakage
certification plays an important role to address the following question:“how good is my …