Applications of machine learning techniques in side-channel attacks: a survey
With increasing expansion of the Internet of Things, embedded devices equipped with
cryptographic modules become an important factor to protect sensitive data. Even though …
cryptographic modules become an important factor to protect sensitive data. Even though …
Efficient, portable template attacks
MO Choudary, MG Kuhn - IEEE Transactions on Information …, 2017 - ieeexplore.ieee.org
Template attacks recover data values processed by tamper-resistant devices from side-
channel waveforms, such as supply-current fluctuations (power analysis) or electromagnetic …
channel waveforms, such as supply-current fluctuations (power analysis) or electromagnetic …
SCAUL: Power side-channel analysis with unsupervised learning
K Ramezanpour, P Ampadu… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Existing power analysis techniques rely on strong adversary models with prior knowledge of
the leakage or training data. We introduce side-channel analysis with unsupervised learning …
the leakage or training data. We introduce side-channel analysis with unsupervised learning …
Profiled power analysis attacks using convolutional neural networks with domain knowledge
Abstract Evaluation of cryptographic implementations against profiled side-channel attacks
plays a fundamental role in security testing nowadays. Recently, deep neural networks and …
plays a fundamental role in security testing nowadays. Recently, deep neural networks and …
Understanding screaming channels: From a detailed analysis to improved attacks
Recently, some wireless devices have been found vulnerable to a novel class of side-
channel attacks, called Screaming Channels. These leaks might appear if the sensitive …
channel attacks, called Screaming Channels. These leaks might appear if the sensitive …
Ridge-based DPA: Improvement of differential power analysis for nanoscale chips
Differential power analysis (DPA), as a very practical type of side-channel attacks, has been
widely studied and used for the security analysis of cryptographic implementations …
widely studied and used for the security analysis of cryptographic implementations …
On the evaluation of deep learning-based side-channel analysis
Deep learning-based side-channel analysis is rapidly positioning itself as a de-facto
standard for the most powerful profiling side-channel analysis. The results from the last few …
standard for the most powerful profiling side-channel analysis. The results from the last few …
SCARL: side-channel analysis with reinforcement learning on the ascon authenticated cipher
Existing side-channel analysis techniques require a leakage model, in the form of a prior
knowledge or a set of training data, to establish a relationship between the secret data and …
knowledge or a set of training data, to establish a relationship between the secret data and …
[PDF][PDF] Wavelet support vector machine algorithm in power analysis attacks
S Hou, Y Zhou, H Liu, N Zhu - Radioengineering, 2017 - researchgate.net
Template attacks and machine learning are two powerful methods in the field of side
channel attacks. In this paper, we aimed to contribute to the novel application of support …
channel attacks. In this paper, we aimed to contribute to the novel application of support …
Side-channel attacks in a real scenario
M Tang, M Luo, J Zhou, Z Yang, Z Guo… - Tsinghua Science …, 2018 - ieeexplore.ieee.org
Existing Side-Channel Attacks (SCAs) have several limitations and, rather than to be real
attack methods, can only be considered to be security evaluation methods. Their limitations …
attack methods, can only be considered to be security evaluation methods. Their limitations …