Optimization Technique for Deep Learning Methodology on Power Side Channel Attacks

AA Ahmed, MK Hasan, NS Nafi… - 2023 33rd …, 2023 - ieeexplore.ieee.org
The first non-profiled side-channel attack (SCA) method using deep learning is Timon's
Differential Deep Learning Analysis (DDLA). This method is effective in retrieving the secret …

Portability of Deep-Learning Side-Channel Attacks against Software discrepancies

C Wang, M Ninan, S Reilly, J Ward… - Proceedings of the 16th …, 2023 - dl.acm.org
Deep-learning side-channel attacks can reveal encryption keys on a device by analyzing
power consumption with neural networks. However, the portability of deep-learning side …

TinyPower: Side-Channel Attacks with Tiny Neural Networks

H Li, M Ninan, B Wang… - 2024 IEEE International …, 2024 - ieeexplore.ieee.org
Side-channel attacks leverage correlations between power consumption and intermediate
encryption results to infer encryption keys. Recent studies show that deep learning offers …

LDL-SCA: Linearized Deep Learning Side-Channel Attack Targeting Multi-tenant FPGAs✱

Y Zhu, S Liu, L Yang, P Zhou - … of the Great Lakes Symposium on VLSI …, 2024 - dl.acm.org
In recent years, deep-learning side-channel attacks (DL-SCA) have gained increasing
attention due to their enhanced efficacy against cryptographic modules. This paper explores …

TripletViNet: Mitigating Misinformation Video Spread Across Platforms

P Smolovic, T Dahanayaka… - Proceedings of the 1st …, 2024 - dl.acm.org
There has been rampant propagation of fake news and misinformation videos on many
platforms lately, and moderation of such content faces many challenges that must be …

AI-based Fingerprinting over Stream, Cache and RF Signals

H Li - 2023 - search.proquest.com
Fingerprinting is a technique that identifies websites, software and devices by leveraging a
group of information from users. An attacker can acquire users' secrets by only analyzing …