Deep learning for side-channel analysis and introduction to ASCAD database

R Benadjila, E Prouff, R Strullu, E Cagli… - Journal of Cryptographic …, 2020 - Springer
Recent works have demonstrated that deep learning algorithms were efficient to conduct
security evaluations of embedded systems and had many advantages compared to the other …

Convolutional neural networks with data augmentation against jitter-based countermeasures: Profiling attacks without pre-processing

E Cagli, C Dumas, E Prouff - … and Embedded Systems–CHES 2017: 19th …, 2017 - Springer
In the context of the security evaluation of cryptographic implementations, profiling attacks
(aka Template Attacks) play a fundamental role. Nowadays the most popular Template …

The side-channel metrics cheat sheet

K Papagiannopoulos, O Glamočanin… - ACM Computing …, 2023 - dl.acm.org
Side-channel attacks exploit a physical observable originating from a cryptographic device
in order to extract its secrets. Many practically relevant advances in the field of side-channel …

I choose you: Automated hyperparameter tuning for deep learning-based side-channel analysis

L Wu, G Perin, S Picek - IEEE Transactions on Emerging …, 2022 - ieeexplore.ieee.org
Today, the deep learning-based side-channel analysis represents a widely researched
topic, with numerous results indicating the advantages of such an approach. Indeed …

Recent advances in deep learning‐based side‐channel analysis

S Jin, S Kim, HS Kim, S Hong - Etri Journal, 2020 - Wiley Online Library
As side‐channel analysis and machine learning algorithms share the same objective of
classifying data, numerous studies have been proposed for adapting machine learning to …

Template attacks vs. machine learning revisited (and the curse of dimensionality in side-channel analysis)

L Lerman, R Poussier, G Bontempi… - … Side-Channel Analysis …, 2015 - Springer
Template attacks and machine learning are two popular approaches to profiled side-
channel analysis. In this paper, we aim to contribute to the understanding of their respective …

Strength in numbers: Improving generalization with ensembles in machine learning-based profiled side-channel analysis

G Perin, Ł Chmielewski, S Picek - IACR Transactions on …, 2020 - tches.iacr.org
The adoption of deep neural networks for profiled side-channel attacks provides powerful
options for leakage detection and key retrieval of secure products. When training a neural …

Applications of machine learning techniques in side-channel attacks: a survey

B Hettwer, S Gehrer, T Güneysu - Journal of Cryptographic Engineering, 2020 - Springer
With increasing expansion of the Internet of Things, embedded devices equipped with
cryptographic modules become an important factor to protect sensitive data. Even though …

Machine learning for hardware security: Opportunities and risks

R Elnaggar, K Chakrabarty - Journal of Electronic Testing, 2018 - Springer
Recently, machine learning algorithms have been utilized by system defenders and
attackers to secure and attack hardware, respectively. In this work, we investigate the impact …

Practical approaches toward deep-learning-based cross-device power side-channel attack

A Golder, D Das, J Danial, S Ghosh… - … Transactions on Very …, 2019 - ieeexplore.ieee.org
Power side-channel analysis (SCA) has been of immense interest to most embedded
designers to evaluate the physical security of the system. This work presents profiling-based …