Applications of machine learning techniques in side-channel attacks: a survey

B Hettwer, S Gehrer, T Güneysu - Journal of Cryptographic Engineering, 2020 - Springer
With increasing expansion of the Internet of Things, embedded devices equipped with
cryptographic modules become an important factor to protect sensitive data. Even though …

Efficient, portable template attacks

MO Choudary, MG Kuhn - IEEE Transactions on Information …, 2017 - ieeexplore.ieee.org
Template attacks recover data values processed by tamper-resistant devices from side-
channel waveforms, such as supply-current fluctuations (power analysis) or electromagnetic …

SCAUL: Power side-channel analysis with unsupervised learning

K Ramezanpour, P Ampadu… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Existing power analysis techniques rely on strong adversary models with prior knowledge of
the leakage or training data. We introduce side-channel analysis with unsupervised learning …

Profiled power analysis attacks using convolutional neural networks with domain knowledge

B Hettwer, S Gehrer, T Güneysu - International Conference on Selected …, 2018 - Springer
Abstract Evaluation of cryptographic implementations against profiled side-channel attacks
plays a fundamental role in security testing nowadays. Recently, deep neural networks and …

Understanding screaming channels: From a detailed analysis to improved attacks

G Camurati, A Francillon, FX Standaert - IACR transactions on …, 2020 - hal.science
Recently, some wireless devices have been found vulnerable to a novel class of side-
channel attacks, called Screaming Channels. These leaks might appear if the sensitive …

Ridge-based DPA: Improvement of differential power analysis for nanoscale chips

W Wang, Y Yu, FX Standaert, J Liu… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Differential power analysis (DPA), as a very practical type of side-channel attacks, has been
widely studied and used for the security analysis of cryptographic implementations …

On the evaluation of deep learning-based side-channel analysis

L Wu, G Perin, S Picek - … on Constructive Side-Channel Analysis and …, 2022 - Springer
Deep learning-based side-channel analysis is rapidly positioning itself as a de-facto
standard for the most powerful profiling side-channel analysis. The results from the last few …

SCARL: side-channel analysis with reinforcement learning on the ascon authenticated cipher

K Ramezanpour, P Ampadu, W Diehl - arXiv preprint arXiv:2006.03995, 2020 - arxiv.org
Existing side-channel analysis techniques require a leakage model, in the form of a prior
knowledge or a set of training data, to establish a relationship between the secret data and …

[PDF][PDF] Wavelet support vector machine algorithm in power analysis attacks

S Hou, Y Zhou, H Liu, N Zhu - Radioengineering, 2017 - researchgate.net
Template attacks and machine learning are two powerful methods in the field of side
channel attacks. In this paper, we aimed to contribute to the novel application of support …

Side-channel attacks in a real scenario

M Tang, M Luo, J Zhou, Z Yang, Z Guo… - Tsinghua Science …, 2018 - ieeexplore.ieee.org
Existing Side-Channel Attacks (SCAs) have several limitations and, rather than to be real
attack methods, can only be considered to be security evaluation methods. Their limitations …