Sok: Deep learning-based physical side-channel analysis

S Picek, G Perin, L Mariot, L Wu, L Batina - ACM Computing Surveys, 2023 - dl.acm.org
Side-channel attacks represent a realistic and serious threat to the security of embedded
devices for already almost three decades. A variety of attacks and targets they can be …

A review and comparison of AI-enhanced side channel analysis

M Panoff, H Yu, H Shan, Y Jin - ACM Journal on Emerging Technologies …, 2022 - dl.acm.org
Side Channel Analysis (SCA) presents a clear threat to privacy and security in modern
computing systems. The vast majority of communications are secured through cryptographic …

It'sa kind of magic: a novel conditional GAN framework for efficient profiling side-channel analysis

S Karayalçın, M Krček, L Wu, S Picek… - … Conference on the Theory …, 2024 - Springer
Profiling side-channel analysis (SCA) is widely used to evaluate the security of
cryptographic implementations under worst-case attack scenarios. This method assumes a …

Tripletpower: Deep-learning side-channel attacks over few traces

C Wang, J Dani, S Reilly, A Brownfield… - … Security and Trust …, 2023 - ieeexplore.ieee.org
Deep learning has been utilized as a promising technique in side-channel attacks. However,
to recover keys successfully, deep-learning side-channel attacks often require thousands of …

Generative AI in cyber security of cyber physical systems: Benefits and threats

HS Mavikumbure, V Cobilean… - … on Human System …, 2024 - ieeexplore.ieee.org
The advancements in Cyber-Physical Systems (CPSs) have also increased their
vulnerability to various cyber-attacks. Therefore, it is crucial to develop strong cybersecurity …

Preprocessing of the physical leakage information to combine side-channel distinguishers

S Seçkiner, S Köse - IEEE Transactions on Very Large Scale …, 2021 - ieeexplore.ieee.org
The security and privacy of modern computing devices have become an important design
metric with the unprecedented increase in the amount of personal information stored in the …

Power side channel attacks: Where are we standing?

M Taouil, A Aljuffri, S Hamdioui - 2021 16th International …, 2021 - ieeexplore.ieee.org
Side channel attacks are a serious threat to integrated circuits. They are hardly detectable
and use inherent information leaked by the hardware to infer sensitive information like secret …

[PDF][PDF] Dual-leak: Deep unsupervised active learning for cross-device profiled side-channel leakage analysis

H Yu, S Wang, H Shan, M Panoff, M Lee… - 2023 IEEE International …, 2023 - par.nsf.gov
Deep Learning (DL)-based side-channel analysis (SCA), as a new branch of SCA attacks,
poses a significant privacy and security threat to implementations of cryptographic …

LD-PA: Distilling Univariate Leakage for Deep Learning-based Profiling Attacks

C Xiao, M Tang, S Karayalcin… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
The deep learning-based profiling attacks have received significant attention for their
potential against masking-protected devices. Currently, additional capabilities like exploiting …

Power side-channel leakage localization through adversarial training of deep neural networks

J Gammell, A Raghunathan, K Roy - arXiv preprint arXiv:2410.22425, 2024 - arxiv.org
Supervised deep learning has emerged as an effective tool for carrying out power side-
channel attacks on cryptographic implementations. While increasingly-powerful deep …