The threat of offensive ai to organizations
AI has provided us with the ability to automate tasks, extract information from vast amounts of
data, and synthesize media that is nearly indistinguishable from the real thing. However …
data, and synthesize media that is nearly indistinguishable from the real thing. However …
[HTML][HTML] No (good) loss no gain: systematic evaluation of loss functions in deep learning-based side-channel analysis
Deep learning is a powerful direction for profiling side-channel analysis as it can break
targets protected with countermeasures even with a relatively small number of attack traces …
targets protected with countermeasures even with a relatively small number of attack traces …
On the performance of non‐profiled side channel attacks based on deep learning techniques
In modern embedded systems, security issues including side‐channel attacks (SCAs) are
becoming of paramount importance since the embedded devices are ubiquitous in many …
becoming of paramount importance since the embedded devices are ubiquitous in many …
Lightweight but not easy: side-channel analysis of the ascon authenticated cipher on a 32-bit microcontroller
L Weissbart, S Picek - Cryptology ePrint Archive, 2023 - eprint.iacr.org
Ascon is a recently standardized suite of symmetric cryptography for authenticated
encryption and hashing algorithms designed to be lightweight. The Ascon scheme has been …
encryption and hashing algorithms designed to be lightweight. The Ascon scheme has been …
Deep learning for cyber security applications: A comprehensive survey
M Alazab, KP Soman, S Srinivasan, S Venkatraman… - Authorea …, 2023 - techrxiv.org
Deep Learning (DL), a novel form of machine learning (ML) is gaining much research
interest due to its successful application in many classical artificial intelligence (AI) tasks as …
interest due to its successful application in many classical artificial intelligence (AI) tasks as …
Design of Convolutional Neural Networks Architecture for Non-Profiled Side-Channel Attack Detection
Deep learning (DL) is a new option that has just been made available for side-channel
analysis. DL approaches for profiled side-channel attacks (SCA) have dominated research …
analysis. DL approaches for profiled side-channel attacks (SCA) have dominated research …
Information bounds and convergence rates for side-channel security evaluators
Current side-channel evaluation methodologies exhibit a gap between inefficient tools
offering strong theoretical guarantees and efficient tools only offering heuristic (sometimes …
offering strong theoretical guarantees and efficient tools only offering heuristic (sometimes …
On the security of lightweight block ciphers against neural distinguishers: Observations on LBC-IoT and SLIM
Interest in the application of deep learning in cryptography has increased immensely in
recent years. Several works have shown that such attacks are not only feasible but, in some …
recent years. Several works have shown that such attacks are not only feasible but, in some …
[PDF][PDF] A comprehensive tutorial and survey of applications of deep learning for cyber security
A Comprehensive Tutorial and Survey of Applications of Deep Learning for Cyber Security
Page 1 P osted on 5 Jan 2020 — CC-BY 4.0 — h ttps://doi.org/10.36227/tech rxiv.11473377.v1 …
Page 1 P osted on 5 Jan 2020 — CC-BY 4.0 — h ttps://doi.org/10.36227/tech rxiv.11473377.v1 …
On the Instability of Softmax Attention-Based Deep Learning Models in Side-Channel Analysis
In side-channel analysis (SCA), Points-of-Interest (PoIs), ie, the informative sample points
remain sparsely scattered across the whole side-channel trace. Several works in the SCA …
remain sparsely scattered across the whole side-channel trace. Several works in the SCA …