Make some noise. unleashing the power of convolutional neural networks for profiled side-channel analysis

J Kim, S Picek, A Heuser, S Bhasin… - IACR Transactions on …, 2019 - tches.iacr.org
Profiled side-channel analysis based on deep learning, and more precisely Convolutional
Neural Networks, is a paradigm showing significant potential. The results, although scarce …

On the performance of convolutional neural networks for side-channel analysis

S Picek, IP Samiotis, J Kim, A Heuser, S Bhasin… - Security, Privacy, and …, 2018 - Springer
In this work, we ask a question whether Convolutional Neural Networks are more suitable for
side-channel attacks than some other machine learning techniques and if yes, in what …

Applications of machine learning techniques in side-channel attacks: a survey

B Hettwer, S Gehrer, T Güneysu - Journal of Cryptographic Engineering, 2020 - Springer
With increasing expansion of the Internet of Things, embedded devices equipped with
cryptographic modules become an important factor to protect sensitive data. Even though …

A survey on hardware vulnerability analysis using machine learning

Z Pan, P Mishra - IEEE Access, 2022 - ieeexplore.ieee.org
Electronic systems rely on efficient hardware, popularly known as system-on-chip (SoC), to
support its core functionalities. A typical SoC consists of diverse components gathered from …

Mind the portability: A warriors guide through realistic profiled side-channel analysis

S Bhasin, A Chattopadhyay, A Heuser… - NDSS 2020-Network …, 2020 - inria.hal.science
Profiled side-channel attacks represent a practical threat to digital devices, thereby having
the potential to disrupt the foundation of e-commerce, the Internet of Things (IoT), and smart …

SCAUL: Power side-channel analysis with unsupervised learning

K Ramezanpour, P Ampadu… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Existing power analysis techniques rely on strong adversary models with prior knowledge of
the leakage or training data. We introduce side-channel analysis with unsupervised learning …

Template attack versus Bayes classifier

S Picek, A Heuser, S Guilley - Journal of Cryptographic Engineering, 2017 - Springer
Side-channel attacks represent one of the most powerful categories of attacks on
cryptographic devices with profiled attacks in a prominent place as the most powerful among …

Deep learning mitigates but does not annihilate the need of aligned traces and a generalized resnet model for side-channel attacks

Y Zhou, FX Standaert - Journal of Cryptographic Engineering, 2020 - Springer
We consider the question whether synchronization/alignment methods are still
useful/necessary in the context of side-channel attacks exploiting deep learning algorithms …

Profiled side-channel analysis in the efficient attacker framework

S Picek, A Heuser, G Perin, S Guilley - International Conference on Smart …, 2021 - Springer
Profiled side-channel attacks represent the most powerful category of side-channel attacks.
There, the attacker has access to a clone device to profile its leaking behavior. Additionally …

[图书][B] Security of ubiquitous computing systems: Selected topics

G Avoine, J Hernandez-Castro - 2021 - library.oapen.org
The chapters in this open access book arise out of the EU Cost Action project Cryptacus, the
objective of which was to improve and adapt existent cryptanalysis methodologies and tools …