Sok: Deep learning-based physical side-channel analysis

S Picek, G Perin, L Mariot, L Wu, L Batina - ACM Computing Surveys, 2023 - dl.acm.org
Side-channel attacks represent a realistic and serious threat to the security of embedded
devices for already almost three decades. A variety of attacks and targets they can be …

I know what you see: Power side-channel attack on convolutional neural network accelerators

L Wei, B Luo, Y Li, Y Liu, Q Xu - … of the 34th Annual Computer Security …, 2018 - dl.acm.org
Deep learning has become the de-facto computational paradigm for various kinds of
perception problems, including many privacy-sensitive applications such as online medical …

Introduction to differential power analysis

P Kocher, J Jaffe, B Jun, P Rohatgi - Journal of Cryptographic Engineering, 2011 - Springer
The power consumed by a circuit varies according to the activity of its individual transistors
and other components. As a result, measurements of the power used by actual computers or …

Trojan detection using IC fingerprinting

D Agrawal, S Baktir, D Karakoyunlu… - … IEEE Symposium on …, 2007 - ieeexplore.ieee.org
Hardware manufacturers are increasingly outsourcing their IC fabrication work overseas due
to their much lower cost structure. This poses a significant security risk for ICs used for …

Machine learning in side-channel analysis: a first study

G Hospodar, B Gierlichs, E De Mulder… - Journal of Cryptographic …, 2011 - Springer
Electronic devices may undergo attacks going beyond traditional cryptanalysis. Side-
channel analysis (SCA) is an alternative attack that exploits information leaking from …

A comprehensive survey on the non-invasive passive side-channel analysis

P Socha, V Miškovský, M Novotný - Sensors, 2022 - mdpi.com
Side-channel analysis has become a widely recognized threat to the security of
cryptographic implementations. Different side-channel attacks, as well as countermeasures …

Efficient template attacks

O Choudary, MG Kuhn - Smart Card Research and Advanced Applications …, 2014 - Springer
Template attacks remain a powerful side-channel technique to eavesdrop on tamper-
resistant hardware. They model the probability distribution of leaking signals and noise to …

X-DeepSCA: Cross-device deep learning side channel attack

D Das, A Golder, J Danial, S Ghosh… - Proceedings of the 56th …, 2019 - dl.acm.org
This article, for the first time, demonstrates Cross-device Deep Learning Side-Channel
Attack (X-DeepSCA), achieving an accuracy of> 99.9%, even in presence of significantly …

Template attacks in principal subspaces

C Archambeau, E Peeters, FX Standaert… - … and Embedded Systems …, 2006 - Springer
Side-channel attacks are a serious threat to implementations of cryptographic algorithms.
Secret information is recovered based on power consumption, electromagnetic emanations …

Intelligent machine homicide: Breaking cryptographic devices using support vector machines

A Heuser, M Zohner - … Workshop on Constructive Side-Channel Analysis …, 2012 - Springer
In this contribution we propose the so-called SVM attack, a profiling based side channel
attack, which uses the machine learning algorithm support vector machines (SVM) in order …