Exploring feature selection scenarios for deep learning-based side-channel analysis
One of the main promoted advantages of deep learning in profiling side-channel analysis is
the possibility of skipping the feature engineering process. Despite that, most recent …
the possibility of skipping the feature engineering process. Despite that, most recent …
The best of two worlds: Deep learning-assisted template attack
In the last decade, machine learning-based side-channel attacks have become a standard
option when investigating profiling side-channel attacks. At the same time, the previous state …
option when investigating profiling side-channel attacks. At the same time, the previous state …
[PDF][PDF] Scalib: a side-channel analysis library
G Cassiers, O Bronchain - Journal of Open Source Software, 2023 - joss.theoj.org
Side-channel attacks exploit unintended leakage from an electronic device in order to
retrieve secret data. In particular, attacks exploiting physical side-channels such as power …
retrieve secret data. In particular, attacks exploiting physical side-channels such as power …
It'sa kind of magic: a novel conditional GAN framework for efficient profiling side-channel analysis
Profiling side-channel analysis (SCA) is widely used to evaluate the security of
cryptographic implementations under worst-case attack scenarios. This method assumes a …
cryptographic implementations under worst-case attack scenarios. This method assumes a …
Leakyohm: Secret bits extraction using impedance analysis
The threats of physical side-channel attacks and their countermeasures have been widely
researched. Most physical side-channel attacks rely on the unavoidable influence of …
researched. Most physical side-channel attacks rely on the unavoidable influence of …
Efficient profiled side-channel analysis of masked implementations, extended
We extend the study of efficient profiled attacks on masking schemes initiated by Lerman
and Markowitch (TIFS, 2019) in different directions. First, we study both the profiling …
and Markowitch (TIFS, 2019) in different directions. First, we study both the profiling …
On the Instability of Softmax Attention-Based Deep Learning Models in Side-Channel Analysis
In side-channel analysis (SCA), Points-of-Interest (PoIs), ie, the informative sample points
remain sparsely scattered across the whole side-channel trace. Several works in the SCA …
remain sparsely scattered across the whole side-channel trace. Several works in the SCA …
Bitslice masking and improved shuffling: How and when to mix them in software?
M Azouaoui, O Bronchain, V Grosso… - IACR Transactions on …, 2022 - hal.science
We revisit the popular adage that side-channel countermeasures must be combined to be
efficient, and study its application to bitslice masking and shuffling. Our contributions are …
efficient, and study its application to bitslice masking and shuffling. Our contributions are …
[PDF][PDF] Towards Achieving Provable Side-Channel Security in Practice.
Physical side-channel attacks are powerful attacks that exploit a device's physical
emanations to break the security of cryptographic implementations. Many countermeasures …
emanations to break the security of cryptographic implementations. Many countermeasures …
A methodology to achieve provable side-channel security in real-world implementations
Physical side-channel attacks exploit a device's emanations to compromise the security of
cryptographic implementations. Many countermeasures have been proposed against these …
cryptographic implementations. Many countermeasures have been proposed against these …