How machine learning changes the nature of cyberattacks on IoT networks: A survey

E Bout, V Loscri, A Gallais - IEEE Communications Surveys & …, 2021 - ieeexplore.ieee.org
The Internet of Things (IoT) has continued gaining in popularity and importance in everyday
life in recent years. However, this development does not only present advantages. Indeed …

Power side-channel attack analysis: A review of 20 years of study for the layman

M Randolph, W Diehl - Cryptography, 2020 - mdpi.com
Physical cryptographic implementations are vulnerable to so-called side-channel attacks, in
which sensitive information can be recovered by analyzing physical phenomena of a device …

Breaking cryptographic implementations using deep learning techniques

H Maghrebi, T Portigliatti, E Prouff - Security, Privacy, and Applied …, 2016 - Springer
Template attack is the most common and powerful profiled side channel attack. It relies on a
realistic assumption regarding the noise of the device under attack: the probability density …

Vqmivc: Vector quantization and mutual information-based unsupervised speech representation disentanglement for one-shot voice conversion

D Wang, L Deng, YT Yeung, X Chen, X Liu… - arXiv preprint arXiv …, 2021 - arxiv.org
One-shot voice conversion (VC), which performs conversion across arbitrary speakers with
only a single target-speaker utterance for reference, can be effectively achieved by speech …

Non-profiled deep learning-based side-channel attacks with sensitivity analysis

B Timon - IACR Transactions on Cryptographic Hardware and …, 2019 - tches.iacr.org
Deep Learning has recently been introduced as a new alternative to perform Side-Channel
analysis [MPP16]. Until now, studies have been focused on applying Deep Learning …

A systematic review of optimization algorithms for structural health monitoring and optimal sensor placement

S Hassani, U Dackermann - Sensors, 2023 - mdpi.com
In recent decades, structural health monitoring (SHM) has gained increased importance for
ensuring the sustainability and serviceability of large and complex structures. To design an …

I know what you see: Power side-channel attack on convolutional neural network accelerators

L Wei, B Luo, Y Li, Y Liu, Q Xu - … of the 34th Annual Computer Security …, 2018 - dl.acm.org
Deep learning has become the de-facto computational paradigm for various kinds of
perception problems, including many privacy-sensitive applications such as online medical …

Leakage assessment methodology: A clear roadmap for side-channel evaluations

T Schneider, A Moradi - … Hardware and Embedded Systems--CHES 2015 …, 2015 - Springer
Evoked by the increasing need to integrate side-channel countermeasures into security-
enabled commercial devices, evaluation labs are seeking a standard approach that enables …

[PDF][PDF] A testing methodology for side-channel resistance validation

BJ Gilbert Goodwill, J Jaffe, P Rohatgi - NIST non-invasive attack …, 2011 - csrc.nist.rip
The goal of a side-channel resistance validation program is to assess whether a
cryptographic module utilizing sidechannel analysis countermeasures can provide …

Pushing the limits: A very compact and a threshold implementation of AES

A Moradi, A Poschmann, S Ling, C Paar… - Advances in Cryptology …, 2011 - Springer
Our contribution is twofold: first we describe a very compact hardware implementation of
AES-128, which requires only 2400 GE. This is to the best of our knowledge the smallest …