Preprocessing of the physical leakage information to combine side-channel distinguishers

S Seçkiner, S Köse - IEEE Transactions on Very Large Scale …, 2021 - ieeexplore.ieee.org
The security and privacy of modern computing devices have become an important design
metric with the unprecedented increase in the amount of personal information stored in the …

Traditional machine learning methods for side-channel analysis

A Jovic, D Jap, L Papachristodoulou… - Security and Artificial …, 2022 - Springer
Traditional machine learning techniques (excluding deep learning) include a range of
approaches, such as supervised, semi-supervised, and unsupervised modeling methods …

A highly efficient side channel attack with profiling through relevance-learning on physical leakage information

AA Pammu, KS Chong, Y Wang… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
We propose a Profiling through Relevance-Learning (PRL) technique on Physical Leakage
Information (PLI) to extract highly correlated PLI with processed data, as to achieve a highly …

A Unified and Fully Automated Framework for Wavelet-Based Attacks on Random Delay

Q Wu, F Zhang, S Guo, K Yang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
As a common defense against side-channel attacks, random delay insertion introduces
noise into the executive flow of encryption, which increases attack complexity. Accordingly …

Explore Adversarial Attack via Black Box Variational Inference

C Zhao, B Ni, S Mei - IEEE Signal Processing Letters, 2022 - ieeexplore.ieee.org
From the perspective of probability, we propose a new method for black-box adversarial
attack via black-box variational inference (BBVI), where the knowledge of victim model is …

Side channel leakage alignment based on longest common subsequence

A Jia, W Yang, G Zhang - … Conference on Big Data Science and …, 2020 - ieeexplore.ieee.org
Side channel attacks (SCA) are powerful tools to recover the secret keys of cryptographic
devices by employing physical leakages of the devices. In practice, numerous …

Analysis of Electromagnetic Information Leakage Based on Cryptographic Integrated Circuits

S Sun, H Zhang, X Cui, Q Li, L Dong, X Fang - Entropy, 2021 - mdpi.com
Cryptographic algorithm is the most commonly used method of information security
protection for many devices. The secret key of cryptographic algorithm is usually stored in …

A novel and cost-effective test bed implementation of side channel attacks on aes: Leveraging correlation power analysis and machine learning

OJ Adegbite - 2017 - search.proquest.com
A form of attack that exploits the vulnerabilities in the physical implementations of security
devices (or computing units) is the Side Channel Analysis (SCA) Attack. In SCA, making …

Highly secure and low overhead countermeasures against side-channel attacks

AA Pammu - 2019 - dr.ntu.edu.sg
Side-Channel Attack (SCA) is an emerging technique to reveal the secret key of crypto-
devices by analyzing the processed-data and their Physical Leakage Information (PLI). The …