Deep stacking ensemble learning applied to profiling side-channel attacks
D Llavata, E Cagli, R Eyraud, V Grosso… - … Conference on Smart …, 2023 - Springer
Deep Learning is nowadays widely used by security evaluators to conduct side-channel
attacks, especially in profiling attacks that allow a supervised learning phase. However …
attacks, especially in profiling attacks that allow a supervised learning phase. However …
Automated side-channel attacks using black-box neural architecture search
The application of convolutional neural networks (CNNs) to break cryptographic systems
through hardware side-channels facilitated rapid and adaptable attacks on cryptographic …
through hardware side-channels facilitated rapid and adaptable attacks on cryptographic …
Resolving the doubts: On the construction and use of resnets for side-channel analysis
The deep learning-based side-channel analysis gave some of the most prominent side-
channel attacks against protected targets in the past few years. To this end, the research …
channel attacks against protected targets in the past few years. To this end, the research …
Generic attacks against cryptographic hardware through long-range deep learning
Hardware-based cryptographic implementations utilize countermeasures to resist side-
channel attacks. In this paper, we propose a novel deep-learning architecture for side …
channel attacks. In this paper, we propose a novel deep-learning architecture for side …
Scoring the predictions: a way to improve profiling side-channel attacks
Side-channel analysis is an important part of the security evaluations of hardware
components and more specifically of those that include cryptographic algorithms. Profiling …
components and more specifically of those that include cryptographic algorithms. Profiling …
Quantization-aware Neural Architectural Search for Intrusion Detection
Deploying machine learning-based intrusion detection systems (IDSs) on hardware devices
is challenging due to their limited computational resources, power consumption, and …
is challenging due to their limited computational resources, power consumption, and …
[PDF][PDF] SFGA-CPA: A Novel Screening Correlation Power Analysis Framework Based on Genetic Algorithm.
J Liu, L Li, D Li, Y Ou - Computers, Materials & Continua, 2024 - cdn.techscience.cn
Correlation power analysis (CPA) combined with genetic algorithms (GA) now achieves
greater attack efficiency and can recover all subkeys simultaneously. However, two issues in …
greater attack efficiency and can recover all subkeys simultaneously. However, two issues in …
Train Wisely: Multifidelity Bayesian Optimization Hyperparameter Tuning in Side-Channel Analysis
TYH Eng, S Bhasin, L Weissbart - Cryptology ePrint Archive, 2024 - eprint.iacr.org
Abstract Side-Channel Analysis (SCA) is critical in evaluating the security of cryptographic
implementations. The search for hyperparameters poses a significant challenge, especially …
implementations. The search for hyperparameters poses a significant challenge, especially …
Too Hot To Be True: Temperature Calibration for Higher Confidence in NN-assisted Side-channel Analysis
S Nouraniboosjin, F Ganji - Cryptology ePrint Archive, 2024 - eprint.iacr.org
The past years have witnessed a considerable increase in research efforts put into neural
network-assisted profiled side-channel analysis (SCA). Studies have also identified …
network-assisted profiled side-channel analysis (SCA). Studies have also identified …
Design of Time-Delay Convolutional Neural Networks (TDCNN) Model for Feature Extraction for Side-Channel Attacks
A Abbas Ahmed, M Kamrul Hasan… - … of Computing and …, 2024 - journal.uob.edu.bh
This work explores a novel method of SCA profiling to address compatibility problems and
bolster Deep Learning (DL) models. Convolutional Neural Networks are proposed in this …
bolster Deep Learning (DL) models. Convolutional Neural Networks are proposed in this …