Traditional machine learning techniques (excluding deep learning) include a range of approaches, such as supervised, semi-supervised, and unsupervised modeling methods …
AA Pammu, KS Chong, Y Wang… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
We propose a Profiling through Relevance-Learning (PRL) technique on Physical Leakage Information (PLI) to extract highly correlated PLI with processed data, as to achieve a highly …
Q Wu, F Zhang, S Guo, K Yang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
As a common defense against side-channel attacks, random delay insertion introduces noise into the executive flow of encryption, which increases attack complexity. Accordingly …
C Zhao, B Ni, S Mei - IEEE Signal Processing Letters, 2022 - ieeexplore.ieee.org
From the perspective of probability, we propose a new method for black-box adversarial attack via black-box variational inference (BBVI), where the knowledge of victim model is …
A Jia, W Yang, G Zhang - … Conference on Big Data Science and …, 2020 - ieeexplore.ieee.org
Side channel attacks (SCA) are powerful tools to recover the secret keys of cryptographic devices by employing physical leakages of the devices. In practice, numerous …
S Sun, H Zhang, X Cui, Q Li, L Dong, X Fang - Entropy, 2021 - mdpi.com
Cryptographic algorithm is the most commonly used method of information security protection for many devices. The secret key of cryptographic algorithm is usually stored in …
A form of attack that exploits the vulnerabilities in the physical implementations of security devices (or computing units) is the Side Channel Analysis (SCA) Attack. In SCA, making …
Side-Channel Attack (SCA) is an emerging technique to reveal the secret key of crypto- devices by analyzing the processed-data and their Physical Leakage Information (PLI). The …