Results 21 to 30 of about 2,326,402 (364)
Microwalk-CI: Practical Side-Channel Analysis for JavaScript Applications [PDF]
Secret-dependent timing behavior in cryptographic implementations has resulted in exploitable vulnerabilities, undermining their security. Over the years, numerous tools to automatically detect timing leakage or even to prove their absence have been ...
Jan Wichelmann+3 more
semanticscholar +1 more source
Deep learning is a powerful direction for profiling side-channel analysis as it can break targets protected with countermeasures even with a relatively small number of attack traces. Still, it is necessary to conduct hyperparameter tuning to reach strong
Maikel Kerkhof+3 more
semanticscholar +1 more source
SoK: Deep Learning-based Physical Side-channel Analysis
Side-channel attacks represent a realistic and serious threat to the security of embedded devices for already almost three decades. A variety of attacks and targets they can be applied to have been introduced, and while the area of side-channel attacks ...
S. Picek+4 more
semanticscholar +1 more source
SCALib: A Side-Channel Analysis Library
Side-channel attacks exploit unintended leakage from an electronic device in order to retrieve secret data. In particular, attacks exploiting physical side-channels such as power consumption or electromagnetic radiations to recover cryptographic keys are
Gaëtan Cassiers, Olivier Bronchain
semanticscholar +1 more source
Label Correlation in Deep Learning-Based Side-Channel Analysis
The efficiency of the profiling side-channel analysis can be significantly improved with machine learning techniques. Although powerful, a fundamental machine learning limitation of being data-hungry received little attention in the side-channel ...
Lichao Wu+6 more
semanticscholar +1 more source
Information Theory-based Evolution of Neural Networks for Side-channel Analysis [PDF]
Profiled side-channel analysis (SCA) leverages leakage from cryptographic implementations to extract the secret key. When combined with advanced methods in neural networks (NNs), profiled SCA can successfully attack even those cryptocores assumed to be ...
R. Acharya, F. Ganji, Domenic Forte
semanticscholar +1 more source
AVATAR: NN-Assisted Variation Aware Timing Analysis and Reporting for Hardware Trojan Detection
This paper presents AVATAR, a learning-assisted Trojan testing flow to detect hardware Trojans placed into fabricated ICs at an untrusted foundry, without needing a Golden IC.
Ashkan Vakil+4 more
doaj +1 more source
Exploring Feature Selection Scenarios for Deep Learning-based Side-Channel Analysis
One of the main promoted advantages of deep learning in profiling sidechannel analysis is the possibility of skipping the feature engineering process.
Guilherme Perin, Lichao Wu, S. Picek
semanticscholar +1 more source
Reinforcement Learning for Hyperparameter Tuning in Deep Learning-based Side-channel Analysis
Deep learning represents a powerful set of techniques for profiling sidechannel analysis. The results in the last few years show that neural network architectures like multilayer perceptron and convolutional neural networks give strong attack performance
Jorai Rijsdijk+3 more
semanticscholar +1 more source
Polynomial multiplication algorithms such as Toom-Cook and the Number Theoretic Transform are fundamental building blocks for lattice-based post-quantum cryptography.
Catinca Mujdei+5 more
semanticscholar +1 more source