Deep stacking ensemble learning applied to profiling side-channel attacks

D Llavata, E Cagli, R Eyraud, V Grosso… - … Conference on Smart …, 2023 - Springer
Deep Learning is nowadays widely used by security evaluators to conduct side-channel
attacks, especially in profiling attacks that allow a supervised learning phase. However …

Automated side-channel attacks using black-box neural architecture search

P Gupta, JP Drees, E Hüllermeier - Proceedings of the 18th International …, 2023 - dl.acm.org
The application of convolutional neural networks (CNNs) to break cryptographic systems
through hardware side-channels facilitated rapid and adaptable attacks on cryptographic …

Resolving the doubts: On the construction and use of resnets for side-channel analysis

S Karayalcin, G Perin, S Picek - Mathematics, 2023 - mdpi.com
The deep learning-based side-channel analysis gave some of the most prominent side-
channel attacks against protected targets in the past few years. To this end, the research …

Generic attacks against cryptographic hardware through long-range deep learning

E Bursztein, L Invernizzi, K Král, D Moghimi… - arXiv preprint arXiv …, 2023 - arxiv.org
Hardware-based cryptographic implementations utilize countermeasures to resist side-
channel attacks. In this paper, we propose a novel deep-learning architecture for side …

Scoring the predictions: a way to improve profiling side-channel attacks

D Robissout, L Bossuet, A Habrard - Journal of Cryptographic Engineering, 2024 - Springer
Side-channel analysis is an important part of the security evaluations of hardware
components and more specifically of those that include cryptographic algorithms. Profiling …

Quantization-aware Neural Architectural Search for Intrusion Detection

RY Acharya, LL Jeune, N Mentens, F Ganji… - arXiv preprint arXiv …, 2023 - arxiv.org
Deploying machine learning-based intrusion detection systems (IDSs) on hardware devices
is challenging due to their limited computational resources, power consumption, and …

[PDF][PDF] SFGA-CPA: A Novel Screening Correlation Power Analysis Framework Based on Genetic Algorithm.

J Liu, L Li, D Li, Y Ou - Computers, Materials & Continua, 2024 - cdn.techscience.cn
Correlation power analysis (CPA) combined with genetic algorithms (GA) now achieves
greater attack efficiency and can recover all subkeys simultaneously. However, two issues in …

Train Wisely: Multifidelity Bayesian Optimization Hyperparameter Tuning in Side-Channel Analysis

TYH Eng, S Bhasin, L Weissbart - Cryptology ePrint Archive, 2024 - eprint.iacr.org
Abstract Side-Channel Analysis (SCA) is critical in evaluating the security of cryptographic
implementations. The search for hyperparameters poses a significant challenge, especially …

Too Hot To Be True: Temperature Calibration for Higher Confidence in NN-assisted Side-channel Analysis

S Nouraniboosjin, F Ganji - Cryptology ePrint Archive, 2024 - eprint.iacr.org
The past years have witnessed a considerable increase in research efforts put into neural
network-assisted profiled side-channel analysis (SCA). Studies have also identified …

Design of Time-Delay Convolutional Neural Networks (TDCNN) Model for Feature Extraction for Side-Channel Attacks

A Abbas Ahmed, M Kamrul Hasan… - … of Computing and …, 2024 - journal.uob.edu.bh
This work explores a novel method of SCA profiling to address compatibility problems and
bolster Deep Learning (DL) models. Convolutional Neural Networks are proposed in this …