Searched for: subject%3A%22Side%255C-channel%255C+analysis%22
(1 - 20 of 38)

Pages

document
Li, H. (author)
Electronic devices have permeated into all aspects of our lives, from basic smart cards to sophisticated hybrid automobile systems. These devices comprise a range of products like sensors, wearable gadgets, mobile phones, personal computers, and others, playing vital roles in many applications and enabling the Internet of Things (IoT). However,...
doctoral thesis 2024
document
Aljuffri, A.A.M. (author)
The security of electronic devices holds the greatest importance in the modern digital era, with one of the emerging challenges being the widespread occurrence of hardware attacks. The aforementioned attacks present a substantial risk to hardware devices, and it is of utmost importance to comprehend the potential detrimental effects they may...
doctoral thesis 2024
document
Savu, Ioana (author)
Side-channel attacks (SCA) play a crucial role in assessing the security of the implementation of cryp- tographic algorithms. Still, traditional profiled attacks require a nearly identical reference device to the target, limiting their practicality. This thesis focuses on non-profiled SCA, which provides a re- alistic alternative when the...
master thesis 2023
document
Wu, L. (author)
For almost three decades, side-channel analysis has represented a realistic and severe threat to embedded devices' security. As a well-known and influential class of implementation attacks, side-channel analysis has been applied against cryptographic implementations, processors, communication systems, and, more recently, machine learning models....
doctoral thesis 2023
document
Wu, L. (author), Weissbart, L.J.A. (author), Krcek, M. (author), Li, H. (author), Perin, G. (author), Batina, Lejla (author), Picek, S. (author)
The efficiency of the profiling side-channel analysis can be significantly improved with machine learning techniques. Although powerful, a fundamental machine learning limitation of being data-hungry received little attention in the side-channel community. In practice, the maximum number of leakage traces that evaluators/attackers can obtain is...
journal article 2023
document
Schijlen, Fiske (author), Wu, Lichao (author), Mariot, L. (author)
Side-channel analysis (SCA) is a class of attacks on the physical implementation of a cipher, which enables the extraction of confidential key information by exploiting unintended leaks generated by a device. In recent years, researchers have observed that neural networks (NNs) can be utilized to perform highly effective SCA profiling, even...
journal article 2023
document
Krcek, M. (author), Perin, G. (author)
Hyperparameter tuning represents one of the main challenges in deep learning-based profiling side-channel analysis. For each different side-channel dataset, the typical procedure to find a profiling model is applying hyperparameter tuning from scratch. The main reason is that side-channel measurements from various targets contain different...
journal article 2023
document
Remmerswaal, Mick G.D. (author), Wu, L. (author), Tiran, Sébastien (author), Mentens, Nele (author)
Template attacks (TAs) are one of the most powerful side-channel analysis (SCA) attacks. The success of such attacks relies on the effectiveness of the profiling model in modeling the leakage information. A crucial step for TA is to select relevant features from the measured traces, often called points of interest (POIs), to extract the...
journal article 2023
document
Kerkhof, Maikel (author), Wu, L. (author), Perin, G. (author), Picek, S. (author)
Deep learning is a powerful direction for profiling side-channel analysis as it can break targets protected with countermeasures even with a relatively small number of attack traces. Still, it is necessary to conduct hyperparameter tuning to reach strong attack performance, which can be far from trivial. Besides many options stemming from the...
journal article 2023
document
Aljuffri, A.A.M. (author), Saxena, Mudit (author), Reinbrecht, Cezar (author), Hamdioui, S. (author), Taouil, M. (author)
Security is one of the most important features that a system must provide. Depending on the application of the target device, different threats should be considered at design time. However, the attack space is vast. Hence, it is difficult to decide what components to protect, what level of protection they require and how efficient they are in...
conference paper 2023
document
Bubberman, Wolf (author)
Side-Channel Attacks (SCA) attempt to recover the secret cryptographic key from an electronic device by exploiting the unintended physical leakages of said device. With the devices that are being attacked becoming more sophisticated, so is SCA. In the past few years, the focus of the research in the field of SCA shifted towards the application...
master thesis 2022
document
Karayalçin, Sengim (author)
Some of the most prominent types of attacks against modern cryptographic implementations are side-channel attacks. These attacks leverage some unintended, often physical, leakage of the implementation to retrieve secret information. In recent times, a large part of the focus of side-channel research has been on deep learning methods. These...
master thesis 2022
document
Aljuffri, A.A.M. (author), Reinbrecht, Cezar (author), Hamdioui, S. (author), Taouil, M. (author), Sepulveda, Johanna (author)
Currently NIST is working towards the standardization of lightweight cryptography (LWC). Although the cryptanalytic strength of LWC is currently under deep scrutiny, the LWC implementation security has not been yet widely explored. GIFT block cipher is the main building block of many of the LWC NIST candidates and therefore has the potential to...
conference paper 2022
document
Wu, L. (author), Perin, G. (author), Picek, S. (author)
In the last decade, machine learning-based side-channel attacks have become a standard option when investigating profiling side-channel attacks. At the same time, the previous state-of-the-art technique, template attack, started losing its importance and was more considered a baseline to compare against. As such, most of the results reported...
journal article 2022
document
Knezevic, Karlo (author), Jakobović, Domagoj (author), Picek, S. (author), Ðurasević, Marko (author)
The choice of activation functions can significantly impact the performance of neural networks. Due to an ever-increasing number of new activation functions being proposed in the literature, selecting the appropriate activation function becomes even more difficult. Consequently, many researchers approach this problem from a different angle, in...
journal article 2022
document
Perin, G. (author), Wu, L. (author), Picek, S. (author)
One of the main promoted advantages of deep learning in profiling side-channel analysis is the possibility of skipping the feature engineering process. Despite that, most recent publications consider feature selection as the attacked interval from the side-channel measurements is pre-selected. This is similar to the worst-case security...
journal article 2022
document
Rijsdijk, Jorai (author), Wu, L. (author), Perin, G. (author)
Deep learning-based side-channel attacks are capable of breaking targets protected with countermeasures. The constant progress in the last few years makes the attacks more powerful, requiring fewer traces to break a target. Unfortunately, to protect against such attacks, we still rely solely on methods developed to protect against generic...
conference paper 2022
document
Kerkhof, Maikel (author), Wu, L. (author), Perin, G. (author), Picek, S. (author)
The deep learning-based side-channel analysis represents one of the most powerful side-channel attack approaches. Thanks to its capability in dealing with raw features and countermeasures, it becomes the de facto standard approach for the SCA community. The recent works significantly improved the deep learning-based attacks from various...
conference paper 2022
document
Wu, L. (author), Perin, G. (author), Picek, S. (author)
Deep learning-based side-channel analysis is rapidly positioning itself as a de-facto standard for the most powerful profiling side-channel analysis.The results from the last few years show that deep learning techniques can efficiently break targets that are even protected with countermeasures. While there are constant improvements in making...
conference paper 2022
document
Rezaeezade, A. (author), Perin, G. (author), Picek, S. (author)
Profiling side-channel analysis allows evaluators to estimate the worst-case security of a target. When security evaluations relax the assumptions about the adversary’s knowledge, profiling models may easily be sub-optimal due to the inability to extract the most informative points of interest from the side-channel measurements. When used for...
conference paper 2022
Searched for: subject%3A%22Side%255C-channel%255C+analysis%22
(1 - 20 of 38)

Pages