Exploring feature selection scenarios for deep learning-based side-channel analysis

G Perin, L Wu, S Picek - IACR Transactions on Cryptographic …, 2022 - research.tudelft.nl
One of the main promoted advantages of deep learning in profiling side-channel analysis is
the possibility of skipping the feature engineering process. Despite that, most recent …

The best of two worlds: Deep learning-assisted template attack

L Wu, G Perin, S Picek - IACR Transactions on Cryptographic …, 2022 - research.tudelft.nl
In the last decade, machine learning-based side-channel attacks have become a standard
option when investigating profiling side-channel attacks. At the same time, the previous state …

[PDF][PDF] Scalib: a side-channel analysis library

G Cassiers, O Bronchain - Journal of Open Source Software, 2023 - joss.theoj.org
Side-channel attacks exploit unintended leakage from an electronic device in order to
retrieve secret data. In particular, attacks exploiting physical side-channels such as power …

It'sa kind of magic: a novel conditional GAN framework for efficient profiling side-channel analysis

S Karayalçın, M Krček, L Wu, S Picek… - … Conference on the Theory …, 2024 - Springer
Profiling side-channel analysis (SCA) is widely used to evaluate the security of
cryptographic implementations under worst-case attack scenarios. This method assumes a …

Leakyohm: Secret bits extraction using impedance analysis

SK Monfared, T Mosavirik, S Tajik - Proceedings of the 2023 ACM …, 2023 - dl.acm.org
The threats of physical side-channel attacks and their countermeasures have been widely
researched. Most physical side-channel attacks rely on the unavoidable influence of …

Efficient profiled side-channel analysis of masked implementations, extended

O Bronchain, F Durvaux, L Masure… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
We extend the study of efficient profiled attacks on masking schemes initiated by Lerman
and Markowitch (TIFS, 2019) in different directions. First, we study both the profiling …

On the Instability of Softmax Attention-Based Deep Learning Models in Side-Channel Analysis

S Hajra, M Alam, S Saha, S Picek… - Ieee transactions on …, 2023 - ieeexplore.ieee.org
In side-channel analysis (SCA), Points-of-Interest (PoIs), ie, the informative sample points
remain sparsely scattered across the whole side-channel trace. Several works in the SCA …

Bitslice masking and improved shuffling: How and when to mix them in software?

M Azouaoui, O Bronchain, V Grosso… - IACR Transactions on …, 2022 - hal.science
We revisit the popular adage that side-channel countermeasures must be combined to be
efficient, and study its application to bitslice masking and shuffling. Our contributions are …

[PDF][PDF] Towards Achieving Provable Side-Channel Security in Practice.

S Belaïd, G Cassiers, C Mutschler, M Rivain… - IACR Cryptol. ePrint …, 2023 - iacr.steepath.eu
Physical side-channel attacks are powerful attacks that exploit a device's physical
emanations to break the security of cryptographic implementations. Many countermeasures …

A methodology to achieve provable side-channel security in real-world implementations

S Belaïd, G Cassiers, C Mutschler, M Rivain… - Cryptology ePrint …, 2023 - eprint.iacr.org
Physical side-channel attacks exploit a device's emanations to compromise the security of
cryptographic implementations. Many countermeasures have been proposed against these …