Deep learning for side-channel analysis and introduction to ASCAD database

R Benadjila, E Prouff, R Strullu, E Cagli… - Journal of Cryptographic …, 2020 - Springer
Recent works have demonstrated that deep learning algorithms were efficient to conduct
security evaluations of embedded systems and had many advantages compared to the other …

Convolutional neural networks with data augmentation against jitter-based countermeasures: Profiling attacks without pre-processing

E Cagli, C Dumas, E Prouff - … and Embedded Systems–CHES 2017: 19th …, 2017 - Springer
In the context of the security evaluation of cryptographic implementations, profiling attacks
(aka Template Attacks) play a fundamental role. Nowadays the most popular Template …

Breaking cryptographic implementations using deep learning techniques

H Maghrebi, T Portigliatti, E Prouff - Security, Privacy, and Applied …, 2016 - Springer
Template attack is the most common and powerful profiled side channel attack. It relies on a
realistic assumption regarding the noise of the device under attack: the probability density …

Make some noise. unleashing the power of convolutional neural networks for profiled side-channel analysis

J Kim, S Picek, A Heuser, S Bhasin… - IACR Transactions on …, 2019 - tches.iacr.org
Profiled side-channel analysis based on deep learning, and more precisely Convolutional
Neural Networks, is a paradigm showing significant potential. The results, although scarce …

A review and comparison of AI-enhanced side channel analysis

M Panoff, H Yu, H Shan, Y Jin - ACM Journal on Emerging Technologies …, 2022 - dl.acm.org
Side Channel Analysis (SCA) presents a clear threat to privacy and security in modern
computing systems. The vast majority of communications are secured through cryptographic …

Non-profiled deep learning-based side-channel attacks with sensitivity analysis

B Timon - IACR Transactions on Cryptographic Hardware and …, 2019 - tches.iacr.org
Deep Learning has recently been introduced as a new alternative to perform Side-Channel
analysis [MPP16]. Until now, studies have been focused on applying Deep Learning …

The curse of class imbalance and conflicting metrics with machine learning for side-channel evaluations

S Picek, A Heuser, A Jovic, S Bhasin… - IACR Transactions on …, 2018 - research.tudelft.nl
We concentrate on machine learning techniques used for profiled side-channel analysis in
the presence of imbalanced data. Such scenarios are realistic and often occurring, for …

The side-channel metrics cheat sheet

K Papagiannopoulos, O Glamočanin… - ACM Computing …, 2023 - dl.acm.org
Side-channel attacks exploit a physical observable originating from a cryptographic device
in order to extract its secrets. Many practically relevant advances in the field of side-channel …

[PDF][PDF] A testing methodology for side-channel resistance validation

BJ Gilbert Goodwill, J Jaffe, P Rohatgi - NIST non-invasive attack …, 2011 - csrc.nist.rip
The goal of a side-channel resistance validation program is to assess whether a
cryptographic module utilizing sidechannel analysis countermeasures can provide …

A unified framework for the analysis of side-channel key recovery attacks

FX Standaert, TG Malkin, M Yung - … on the Theory and Applications of …, 2009 - Springer
The fair evaluation and comparison of side-channel attacks and countermeasures has been
a long standing open question, limiting further developments in the field. Motivated by this …