Results 21 to 30 of about 2,326,402 (364)

Microwalk-CI: Practical Side-Channel Analysis for JavaScript Applications [PDF]

open access: yesConference on Computer and Communications Security, 2022
Secret-dependent timing behavior in cryptographic implementations has resulted in exploitable vulnerabilities, undermining their security. Over the years, numerous tools to automatically detect timing leakage or even to prove their absence have been ...
Jan Wichelmann   +3 more
semanticscholar   +1 more source

No (good) loss no gain: systematic evaluation of loss functions in deep learning-based side-channel analysis

open access: yesJournal of Cryptographic Engineering, 2023
Deep learning is a powerful direction for profiling side-channel analysis as it can break targets protected with countermeasures even with a relatively small number of attack traces. Still, it is necessary to conduct hyperparameter tuning to reach strong
Maikel Kerkhof   +3 more
semanticscholar   +1 more source

SoK: Deep Learning-based Physical Side-channel Analysis

open access: yesIACR Cryptology ePrint Archive, 2022
Side-channel attacks represent a realistic and serious threat to the security of embedded devices for already almost three decades. A variety of attacks and targets they can be applied to have been introduced, and while the area of side-channel attacks ...
S. Picek   +4 more
semanticscholar   +1 more source

SCALib: A Side-Channel Analysis Library

open access: yesJournal of Open Source Software, 2023
Side-channel attacks exploit unintended leakage from an electronic device in order to retrieve secret data. In particular, attacks exploiting physical side-channels such as power consumption or electromagnetic radiations to recover cryptographic keys are
Gaëtan Cassiers, Olivier Bronchain
semanticscholar   +1 more source

Label Correlation in Deep Learning-Based Side-Channel Analysis

open access: yesIEEE Transactions on Information Forensics and Security, 2023
The efficiency of the profiling side-channel analysis can be significantly improved with machine learning techniques. Although powerful, a fundamental machine learning limitation of being data-hungry received little attention in the side-channel ...
Lichao Wu   +6 more
semanticscholar   +1 more source

Information Theory-based Evolution of Neural Networks for Side-channel Analysis [PDF]

open access: yesIACR Trans. Cryptogr. Hardw. Embed. Syst., 2021
Profiled side-channel analysis (SCA) leverages leakage from cryptographic implementations to extract the secret key. When combined with advanced methods in neural networks (NNs), profiled SCA can successfully attack even those cryptocores assumed to be ...
R. Acharya, F. Ganji, Domenic Forte
semanticscholar   +1 more source

AVATAR: NN-Assisted Variation Aware Timing Analysis and Reporting for Hardware Trojan Detection

open access: yesIEEE Access, 2021
This paper presents AVATAR, a learning-assisted Trojan testing flow to detect hardware Trojans placed into fabricated ICs at an untrusted foundry, without needing a Golden IC.
Ashkan Vakil   +4 more
doaj   +1 more source

Exploring Feature Selection Scenarios for Deep Learning-based Side-Channel Analysis

open access: yesIACR Cryptology ePrint Archive, 2022
One of the main promoted advantages of deep learning in profiling sidechannel analysis is the possibility of skipping the feature engineering process.
Guilherme Perin, Lichao Wu, S. Picek
semanticscholar   +1 more source

Reinforcement Learning for Hyperparameter Tuning in Deep Learning-based Side-channel Analysis

open access: yesIACR Cryptology ePrint Archive, 2021
Deep learning represents a powerful set of techniques for profiling sidechannel analysis. The results in the last few years show that neural network architectures like multilayer perceptron and convolutional neural networks give strong attack performance
Jorai Rijsdijk   +3 more
semanticscholar   +1 more source

Side-channel Analysis of Lattice-based Post-quantum Cryptography: Exploiting Polynomial Multiplication

open access: yesIACR Cryptology ePrint Archive, 2022
Polynomial multiplication algorithms such as Toom-Cook and the Number Theoretic Transform are fundamental building blocks for lattice-based post-quantum cryptography.
Catinca Mujdei   +5 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy