A review and comparison of AI-enhanced side channel analysis

M Panoff, H Yu, H Shan, Y Jin - ACM Journal on Emerging Technologies …, 2022 - dl.acm.org
Side Channel Analysis (SCA) presents a clear threat to privacy and security in modern
computing systems. The vast majority of communications are secured through cryptographic …

The side-channel metrics cheat sheet

K Papagiannopoulos, O Glamočanin… - ACM Computing …, 2023 - dl.acm.org
Side-channel attacks exploit a physical observable originating from a cryptographic device
in order to extract its secrets. Many practically relevant advances in the field of side-channel …

Physical fault injection and side-channel attacks on mobile devices: A comprehensive analysis

C Shepherd, K Markantonakis, N Van Heijningen… - Computers & …, 2021 - Elsevier
Today's mobile devices contain densely packaged system-on-chips (SoCs) with multi-core,
high-frequency CPUs and complex pipelines. In parallel, sophisticated SoC-assisted …

Cross-device profiled side-channel attacks using meta-transfer learning

H Yu, H Shan, M Panoff, Y Jin - 2021 58th ACM/IEEE Design …, 2021 - ieeexplore.ieee.org
Deep learning (DL) based profiling side channel analysis (SCA) pose a great threat to
embedded devices. An adversary can break the target encryption engine through physical …

Al-pa: cross-device profiled side-channel attack using adversarial learning

P Cao, H Zhang, D Gu, Y Lu, Y Yuan - … of the 59th ACM/IEEE Design …, 2022 - dl.acm.org
In this paper, we focus on the portability issue in profiled side-channel attacks (SCAs) that
arises due to significant device-to-device variations. Device discrepancy is inevitable in …

[HTML][HTML] Ensuring cross-device portability of electromagnetic side-channel analysis for digital forensics

L Navanesan, NA Le-Khac, M Scanlon… - Forensic Science …, 2024 - Elsevier
Investigation on smart devices has become an essential subdomain in digital forensics. The
inherent diversity and complexity of smart devices pose a challenge to the extraction of …

[HTML][HTML] Noise2Clean: cross-device side-channel traces denoising with unsupervised deep learning

H Yu, M Wang, X Song, H Shan, H Qiu, J Wang… - Electronics, 2023 - mdpi.com
Deep learning (DL)-based side-channel analysis (SCA) has posed a severe challenge to
the security and privacy of embedded devices. During its execution, an attacker exploits …

Preserving Privacy of Neuromorphic Hardware From PCIe Congestion Side-Channel Attack

A Das - 2023 IEEE 47th Annual Computers, Software, and …, 2023 - ieeexplore.ieee.org
Neuromorphic systems are equipped with software-managed scratchpad to cache
intermediate results and synaptic weights of a machine learning model. PCIe (Peripheral …

A Taxonomy-based Survey of EM-SCA and Implications For Multi-Robot Systems

YM Ibrahim, SK Kermanshahi… - IEEE Open Journal of …, 2024 - ieeexplore.ieee.org
Electromagnetic Side Channel Analysis (EM-SCA) is a major area of interest within the field
of cybersecurity. EM-SCA makes use of the electromagnetic radiation that naturally leaks …

Evolutionary computation and machine learning in cryptology

S Picek, D Jakobovic - Proceedings of the Genetic and Evolutionary …, 2021 - dl.acm.org
6 Attacks on Ciphers-ML 7 Quantum Protocols-EC 8 Physically Unclonable Functions-EC,
ML 9 Hardware Trojans-EC, ML 10 Side-channel Analysis-ML, EC 11 Fault Injection-EC, ML …