The threat of offensive ai to organizations

Y Mirsky, A Demontis, J Kotak, R Shankar, D Gelei… - Computers & …, 2023 - Elsevier
AI has provided us with the ability to automate tasks, extract information from vast amounts of
data, and synthesize media that is nearly indistinguishable from the real thing. However …

[HTML][HTML] No (good) loss no gain: systematic evaluation of loss functions in deep learning-based side-channel analysis

M Kerkhof, L Wu, G Perin, S Picek - Journal of Cryptographic Engineering, 2023 - Springer
Deep learning is a powerful direction for profiling side-channel analysis as it can break
targets protected with countermeasures even with a relatively small number of attack traces …

On the performance of non‐profiled side channel attacks based on deep learning techniques

NT Do, VP Hoang, VS Doan… - IET Information Security, 2023 - Wiley Online Library
In modern embedded systems, security issues including side‐channel attacks (SCAs) are
becoming of paramount importance since the embedded devices are ubiquitous in many …

Lightweight but not easy: side-channel analysis of the ascon authenticated cipher on a 32-bit microcontroller

L Weissbart, S Picek - Cryptology ePrint Archive, 2023 - eprint.iacr.org
Ascon is a recently standardized suite of symmetric cryptography for authenticated
encryption and hashing algorithms designed to be lightweight. The Ascon scheme has been …

Deep learning for cyber security applications: A comprehensive survey

M Alazab, KP Soman, S Srinivasan, S Venkatraman… - Authorea …, 2023 - techrxiv.org
Deep Learning (DL), a novel form of machine learning (ML) is gaining much research
interest due to its successful application in many classical artificial intelligence (AI) tasks as …

Design of Convolutional Neural Networks Architecture for Non-Profiled Side-Channel Attack Detection

AA Ahmed, MK Hasan, S Islam, AHM Aman… - Elektronika Ir …, 2023 - eejournal.ktu.lt
Deep learning (DL) is a new option that has just been made available for side-channel
analysis. DL approaches for profiled side-channel attacks (SCA) have dominated research …

Information bounds and convergence rates for side-channel security evaluators

L Masure, G Cassiers, J Hendrickx… - IACR Transactions on …, 2023 - tches.iacr.org
Current side-channel evaluation methodologies exhibit a gap between inefficient tools
offering strong theoretical guarantees and efficient tools only offering heuristic (sometimes …

On the security of lightweight block ciphers against neural distinguishers: Observations on LBC-IoT and SLIM

WJ Teng, JS Teh, N Jamil - Journal of Information Security and Applications, 2023 - Elsevier
Interest in the application of deep learning in cryptography has increased immensely in
recent years. Several works have shown that such attacks are not only feasible but, in some …

[PDF][PDF] A comprehensive tutorial and survey of applications of deep learning for cyber security

KP Soman, M Alazab, S Sriram - Authorea Preprints, 2023 - techrxiv.org
A Comprehensive Tutorial and Survey of Applications of Deep Learning for Cyber Security
Page 1 P osted on 5 Jan 2020 — CC-BY 4.0 — h ttps://doi.org/10.36227/tech rxiv.11473377.v1 …

On the Instability of Softmax Attention-Based Deep Learning Models in Side-Channel Analysis

S Hajra, M Alam, S Saha, S Picek… - Ieee transactions on …, 2023 - ieeexplore.ieee.org
In side-channel analysis (SCA), Points-of-Interest (PoIs), ie, the informative sample points
remain sparsely scattered across the whole side-channel trace. Several works in the SCA …