Physical fault injection and side-channel attacks on mobile devices: A comprehensive analysis

C Shepherd, K Markantonakis, N Van Heijningen… - Computers & …, 2021 - Elsevier
Today's mobile devices contain densely packaged system-on-chips (SoCs) with multi-core,
high-frequency CPUs and complex pipelines. In parallel, sophisticated SoC-assisted …

Deep learning side-channel attack against hardware implementations of AES

T Kubota, K Yoshida, M Shiozaki, T Fujino - Microprocessors and …, 2021 - Elsevier
In the field of image recognition, machine learning technologies, especially deep learning,
have been rapidly advancing alongside the advances of hardware such as GPUs. In image …

[HTML][HTML] Tandem deep learning side-channel attack on FPGA implementation of AES

H Wang, E Dubrova - SN Computer Science, 2021 - Springer
Side-channel attacks have become a realistic threat to implementations of cryptographic
algorithms, especially with the help of deep-learning techniques. The majority of recently …

On the influence of optimizers in deep learning-based side-channel analysis

G Perin, S Picek - Selected Areas in Cryptography: 27th International …, 2021 - Springer
The deep learning-based side-channel analysis represents a powerful and easy to deploy
option for profiling side-channel attacks. A detailed tuning phase is often required to reach a …

DL-LA: Deep Learning Leakage Assessment: A modern roadmap for SCA evaluations

T Moos, F Wegener, A Moradi - IACR Transactions on Cryptographic …, 2021 - tches.iacr.org
In recent years, deep learning has become an attractive ingredient to side-channel analysis
(SCA) due to its potential to improve the success probability or enhance the performance of …

Learning when to stop: A mutual information approach to prevent overfitting in profiled side-channel analysis

G Perin, I Buhan, S Picek - … on Constructive Side-Channel Analysis and …, 2021 - Springer
Today, deep neural networks are a common choice for conducting the profiled side-channel
analysis. Unfortunately, it is not trivial to find neural network hyperparameters that would …

Efficiency through diversity in ensemble models applied to side-channel attacks:–a case study on public-key algorithms–

G Zaid, L Bossuet, A Habrard, A Venelli - IACR Transactions on …, 2021 - tches.iacr.org
Abstract Deep Learning based Side-Channel Attacks (DL-SCA) are considered as
fundamental threats against secure cryptographic implementations. Side-channel attacks …

Profiled side-channel analysis in the efficient attacker framework

S Picek, A Heuser, G Perin, S Guilley - International Conference on Smart …, 2021 - Springer
Profiled side-channel attacks represent the most powerful category of side-channel attacks.
There, the attacker has access to a clone device to profile its leaking behavior. Additionally …

[HTML][HTML] Auto-tune POIs: Estimation of distribution algorithms for efficient side-channel analysis

U Rioja, L Batina, JL Flores, I Armendariz - Computer Networks, 2021 - Elsevier
Due to the constant increase and versatility of IoT devices that should keep sensitive
information private, Side-channel Analysis (SCA) attacks on embedded devices are gaining …

Performance comparison between deep learning-based and conventional cryptographic distinguishers

E Bellini, M Rossi - Intelligent Computing: Proceedings of the 2021 …, 2021 - Springer
While many similarities between Machine Learning and cryptanalysis tasks exists, so far no
major result in cryptanalysis has been reached with the aid of Machine Learning techniques …