Physical fault injection and side-channel attacks on mobile devices: A comprehensive analysis
C Shepherd, K Markantonakis, N Van Heijningen… - Computers & …, 2021 - Elsevier
Today's mobile devices contain densely packaged system-on-chips (SoCs) with multi-core,
high-frequency CPUs and complex pipelines. In parallel, sophisticated SoC-assisted …
high-frequency CPUs and complex pipelines. In parallel, sophisticated SoC-assisted …
Deep learning side-channel attack against hardware implementations of AES
In the field of image recognition, machine learning technologies, especially deep learning,
have been rapidly advancing alongside the advances of hardware such as GPUs. In image …
have been rapidly advancing alongside the advances of hardware such as GPUs. In image …
[HTML][HTML] Tandem deep learning side-channel attack on FPGA implementation of AES
Side-channel attacks have become a realistic threat to implementations of cryptographic
algorithms, especially with the help of deep-learning techniques. The majority of recently …
algorithms, especially with the help of deep-learning techniques. The majority of recently …
On the influence of optimizers in deep learning-based side-channel analysis
The deep learning-based side-channel analysis represents a powerful and easy to deploy
option for profiling side-channel attacks. A detailed tuning phase is often required to reach a …
option for profiling side-channel attacks. A detailed tuning phase is often required to reach a …
DL-LA: Deep Learning Leakage Assessment: A modern roadmap for SCA evaluations
In recent years, deep learning has become an attractive ingredient to side-channel analysis
(SCA) due to its potential to improve the success probability or enhance the performance of …
(SCA) due to its potential to improve the success probability or enhance the performance of …
Learning when to stop: A mutual information approach to prevent overfitting in profiled side-channel analysis
Today, deep neural networks are a common choice for conducting the profiled side-channel
analysis. Unfortunately, it is not trivial to find neural network hyperparameters that would …
analysis. Unfortunately, it is not trivial to find neural network hyperparameters that would …
Efficiency through diversity in ensemble models applied to side-channel attacks:–a case study on public-key algorithms–
Abstract Deep Learning based Side-Channel Attacks (DL-SCA) are considered as
fundamental threats against secure cryptographic implementations. Side-channel attacks …
fundamental threats against secure cryptographic implementations. Side-channel attacks …
Profiled side-channel analysis in the efficient attacker framework
Profiled side-channel attacks represent the most powerful category of side-channel attacks.
There, the attacker has access to a clone device to profile its leaking behavior. Additionally …
There, the attacker has access to a clone device to profile its leaking behavior. Additionally …
[HTML][HTML] Auto-tune POIs: Estimation of distribution algorithms for efficient side-channel analysis
Due to the constant increase and versatility of IoT devices that should keep sensitive
information private, Side-channel Analysis (SCA) attacks on embedded devices are gaining …
information private, Side-channel Analysis (SCA) attacks on embedded devices are gaining …
Performance comparison between deep learning-based and conventional cryptographic distinguishers
While many similarities between Machine Learning and cryptanalysis tasks exists, so far no
major result in cryptanalysis has been reached with the aid of Machine Learning techniques …
major result in cryptanalysis has been reached with the aid of Machine Learning techniques …