Methodology for efficient CNN architectures in profiling attacks

G Zaid, L Bossuet, A Habrard, A Venelli - IACR Transactions on …, 2020 - tches.iacr.org
The side-channel community recently investigated a new approach, based on deep
learning, to significantly improve profiled attacks against embedded systems. Previous …

Device-specific security challenges and solution in IoT edge computing: a review

A Roy, J Kokila, N Ramasubramanian… - The Journal of …, 2023 - Springer
Rapid growth in IoT technology demands the need for the emergence of new IoT devices.
IoT devices vary in terms of shape, size, storage, battery life, and computational power …

Hardware security exploiting post-CMOS devices: fundamental device characteristics, state-of-the-art countermeasures, challenges and roadmap

A Japa, MK Majumder, SK Sahoo… - IEEE Circuits and …, 2021 - ieeexplore.ieee.org
Emerging nanoelectronic semiconductor devices have been quite promising in enhancing
hardware-oriented security and trust. However, implementing hardware security primitives …

SCAUL: Power side-channel analysis with unsupervised learning

K Ramezanpour, P Ampadu… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Existing power analysis techniques rely on strong adversary models with prior knowledge of
the leakage or training data. We introduce side-channel analysis with unsupervised learning …

Cryptography and Embedded Systems Security

X Hou, J Breier - Springer, 2024 - Springer
Cryptography is an indispensable tool used to protect information in computing systems.
Billions of people all over the world use it in their daily lives without even noticing there is …

Leakyohm: Secret bits extraction using impedance analysis

SK Monfared, T Mosavirik, S Tajik - Proceedings of the 2023 ACM …, 2023 - dl.acm.org
The threats of physical side-channel attacks and their countermeasures have been widely
researched. Most physical side-channel attacks rely on the unavoidable influence of …

Bake it till you make it: Heat-induced power leakage from masked neural networks

DM Mehta, M Hashemi, DS Koblah… - IACR Transactions …, 2024 - ojs.ub.ruhr-uni-bochum.de
Masking has become one of the most effective approaches for securing hardware designs
against side-channel attacks. Regardless of the effort put into correctly implementing …

Golden-free hardware trojan detection using self-referencing

S Yang, T Hoque, P Chakraborty… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
The globalization of the semiconductor supply chain has developed a new set of challenges
for security researchers. Among them, malicious alterations of hardware designs at an …

Beware your standard cells! on their role in static power side-channel attacks

J Bhandari, L Mankali, M Nabeel… - … on Computer-Aided …, 2024 - ieeexplore.ieee.org
Static or leakage power, which is especially prominent in advanced technology nodes,
enables so-called static power side-channel attacks (S-PSCA). While countermeasures …

On Borrowed Time--Preventing Static Power Side-Channel Analysis

R Dumitru, A Wabnitz, Y Yarom - arXiv preprint arXiv:2307.09001, 2023 - arxiv.org
In recent years, static power side-channel analysis attacks have emerged as a serious threat
to cryptographic implementations, overcoming state-of-the-art countermeasures against side …