A survey of electromagnetic side-channel attacks and discussion on their case-progressing potential for digital forensics

A Sayakkara, NA Le-Khac, M Scanlon - Digital Investigation, 2019 - Elsevier
The increasing prevalence of Internet of Things (IoT) devices has made it inevitable that their
pertinence to digital forensic investigations will increase into the foreseeable future. These …

Deep learning for side-channel analysis and introduction to ASCAD database

R Benadjila, E Prouff, R Strullu, E Cagli… - Journal of Cryptographic …, 2020 - Springer
Recent works have demonstrated that deep learning algorithms were efficient to conduct
security evaluations of embedded systems and had many advantages compared to the other …

IoT goes nuclear: Creating a ZigBee chain reaction

E Ronen, A Shamir, AO Weingarten… - 2017 IEEE Symposium …, 2017 - ieeexplore.ieee.org
Within the next few years, billions of IoT devices will densely populate our cities. In this
paper we describe a new type of threat in which adjacent IoT devices will infect each other …

Breaking cryptographic implementations using deep learning techniques

H Maghrebi, T Portigliatti, E Prouff - Security, Privacy, and Applied …, 2016 - Springer
Template attack is the most common and powerful profiled side channel attack. It relies on a
realistic assumption regarding the noise of the device under attack: the probability density …

Screaming channels: When electromagnetic side channels meet radio transceivers

G Camurati, S Poeplau, M Muench, T Hayes… - Proceedings of the …, 2018 - dl.acm.org
This paper presents a new side channel that affects mixed-signal chips used in widespread
wireless communication protocols, such as Bluetooth and WiFi. This increasingly common …

A comprehensive study of deep learning for side-channel analysis

L Masure, C Dumas, E Prouff - IACR Transactions on Cryptographic …, 2020 - tches.iacr.org
Recently, several studies have been published on the application of deep learning to
enhance Side-Channel Attacks (SCA). These seminal works have practically validated the …

Differential computation analysis: Hiding your white-box designs is not enough

JW Bos, C Hubain, W Michiels, P Teuwen - … , CA, USA, August 17-19, 2016 …, 2016 - Springer
Although all current scientific white-box approaches of standardized cryptographic primitives
are broken, there is still a large number of companies which sell “secure” white-box …

Shaping the glitch: optimizing voltage fault injection attacks

C Bozzato, R Focardi, F Palmarini - IACR transactions on …, 2019 - iris.unive.it
Voltage fault injection is a powerful active side channel attack that modifies the execution-
flow of a device by creating disturbances on the power supply line. The attack typically aims …

Analytical review of cybersecurity for embedded systems

A Aloseel, H He, C Shaw, MA Khan - IEEE Access, 2020 - ieeexplore.ieee.org
To identify the key factors and create the landscape of cybersecurity for embedded systems
(CSES), an analytical review of the existing research on CSES has been conducted. The …

Fault attacks on secure embedded software: Threats, design, and evaluation

B Yuce, P Schaumont, M Witteman - Journal of Hardware and Systems …, 2018 - Springer
Embedded software is developed under the assumption that hardware execution is always
correct. Fault attacks break and exploit that assumption. Through the careful introduction of …