Sok: Deep learning-based physical side-channel analysis
Side-channel attacks represent a realistic and serious threat to the security of embedded
devices for already almost three decades. A variety of attacks and targets they can be …
devices for already almost three decades. A variety of attacks and targets they can be …
I know what you see: Power side-channel attack on convolutional neural network accelerators
Deep learning has become the de-facto computational paradigm for various kinds of
perception problems, including many privacy-sensitive applications such as online medical …
perception problems, including many privacy-sensitive applications such as online medical …
Introduction to differential power analysis
P Kocher, J Jaffe, B Jun, P Rohatgi - Journal of Cryptographic Engineering, 2011 - Springer
The power consumed by a circuit varies according to the activity of its individual transistors
and other components. As a result, measurements of the power used by actual computers or …
and other components. As a result, measurements of the power used by actual computers or …
Trojan detection using IC fingerprinting
D Agrawal, S Baktir, D Karakoyunlu… - … IEEE Symposium on …, 2007 - ieeexplore.ieee.org
Hardware manufacturers are increasingly outsourcing their IC fabrication work overseas due
to their much lower cost structure. This poses a significant security risk for ICs used for …
to their much lower cost structure. This poses a significant security risk for ICs used for …
Machine learning in side-channel analysis: a first study
G Hospodar, B Gierlichs, E De Mulder… - Journal of Cryptographic …, 2011 - Springer
Electronic devices may undergo attacks going beyond traditional cryptanalysis. Side-
channel analysis (SCA) is an alternative attack that exploits information leaking from …
channel analysis (SCA) is an alternative attack that exploits information leaking from …
A comprehensive survey on the non-invasive passive side-channel analysis
Side-channel analysis has become a widely recognized threat to the security of
cryptographic implementations. Different side-channel attacks, as well as countermeasures …
cryptographic implementations. Different side-channel attacks, as well as countermeasures …
Efficient template attacks
O Choudary, MG Kuhn - Smart Card Research and Advanced Applications …, 2014 - Springer
Template attacks remain a powerful side-channel technique to eavesdrop on tamper-
resistant hardware. They model the probability distribution of leaking signals and noise to …
resistant hardware. They model the probability distribution of leaking signals and noise to …
X-DeepSCA: Cross-device deep learning side channel attack
This article, for the first time, demonstrates Cross-device Deep Learning Side-Channel
Attack (X-DeepSCA), achieving an accuracy of> 99.9%, even in presence of significantly …
Attack (X-DeepSCA), achieving an accuracy of> 99.9%, even in presence of significantly …
Template attacks in principal subspaces
C Archambeau, E Peeters, FX Standaert… - … and Embedded Systems …, 2006 - Springer
Side-channel attacks are a serious threat to implementations of cryptographic algorithms.
Secret information is recovered based on power consumption, electromagnetic emanations …
Secret information is recovered based on power consumption, electromagnetic emanations …
Intelligent machine homicide: Breaking cryptographic devices using support vector machines
In this contribution we propose the so-called SVM attack, a profiling based side channel
attack, which uses the machine learning algorithm support vector machines (SVM) in order …
attack, which uses the machine learning algorithm support vector machines (SVM) in order …