- document
-
Wu, L. (author)For almost three decades, side-channel analysis has represented a realistic and severe threat to embedded devices' security. As a well-known and influential class of implementation attacks, side-channel analysis has been applied against cryptographic implementations, processors, communication systems, and, more recently, machine learning models....doctoral thesis 2023
- document
-
Perin, G. (author), Wu, L. (author), Picek, S. (author)The adoption of deep neural networks for profiling side-channel attacks opened new perspectives for leakage detection. Recent publications showed that cryptographic implementations featuring different countermeasures could be broken without feature selection or trace preprocessing. This success comes with a high price: an extensive...journal article 2023
- document
-
Kerkhof, Maikel (author), Wu, L. (author), Perin, G. (author), Picek, S. (author)Deep learning is a powerful direction for profiling side-channel analysis as it can break targets protected with countermeasures even with a relatively small number of attack traces. Still, it is necessary to conduct hyperparameter tuning to reach strong attack performance, which can be far from trivial. Besides many options stemming from the...journal article 2023
- document
-
Blankendal, Philip (author)Side-channel attacks leverage the unintentional leakage of information that indirectly relates to cryptographic secrets such as encryption keys. Previous settings would involve an attacker conducting some manual-statistical analysis to exploit this data and retrieve sensitive information from the target. With the adoption of deep learning...master thesis 2022
- document
-
Bubberman, Wolf (author)Side-Channel Attacks (SCA) attempt to recover the secret cryptographic key from an electronic device by exploiting the unintended physical leakages of said device. With the devices that are being attacked becoming more sophisticated, so is SCA. In the past few years, the focus of the research in the field of SCA shifted towards the application...master thesis 2022
- document
-
de Los Santos Subirats, Alex (author)Software-Defined Networks (SDNs) are a promising new network design paradigm that allows for better control of the network. But as with any new software implementation, there are new security concerns that arise. In the past there have been various papers covering specific side-channel attacks on SDNs; most of them consist of either using time...bachelor thesis 2022
- document
-
Karayalçin, Sengim (author)Some of the most prominent types of attacks against modern cryptographic implementations are side-channel attacks. These attacks leverage some unintended, often physical, leakage of the implementation to retrieve secret information. In recent times, a large part of the focus of side-channel research has been on deep learning methods. These...master thesis 2022
- document
-
Schijlen, Fiske (author)Side-channel attacks (SCA) can obtain secret information related to the private key used during encryption executed on some device by exploiting leakage in power traces produced by the device. In recent years, researchers found that a neural network (NN) can be employed to execute a powerful profiled SCA, even on targets protected with...master thesis 2022
- document
-
Wu, L. (author), Perin, G. (author), Picek, S. (author)In the last decade, machine learning-based side-channel attacks have become a standard option when investigating profiling side-channel attacks. At the same time, the previous state-of-the-art technique, template attack, started losing its importance and was more considered a baseline to compare against. As such, most of the results reported...journal article 2022
- document
-
Knezevic, Karlo (author), Jakobović, Domagoj (author), Picek, S. (author), Ðurasević, Marko (author)The choice of activation functions can significantly impact the performance of neural networks. Due to an ever-increasing number of new activation functions being proposed in the literature, selecting the appropriate activation function becomes even more difficult. Consequently, many researchers approach this problem from a different angle, in...journal article 2022
- document
-
Perin, G. (author), Wu, L. (author), Picek, S. (author)One of the main promoted advantages of deep learning in profiling side-channel analysis is the possibility of skipping the feature engineering process. Despite that, most recent publications consider feature selection as the attacked interval from the side-channel measurements is pre-selected. This is similar to the worst-case security...journal article 2022
- document
-
Cassano, Luca (author), Di Mascio, S. (author), Palumbo, Alessandro (author), Menicucci, A. (author), Furano, Gianluca (author), Bianchi, Giuseppe (author), Ottavi, Marco (author)Integrated circuits employed in space applications generally have very low-volume production and high performance requirements. Therefore, the adoption of Commercial-Off-The-Shelf (COTS) components and Third Party Intellectual Property cores (3PIPs) is of extreme interest to make system design, implementation and deployment cost-effective and...conference paper 2022
- document
-
Kerkhof, Maikel (author), Wu, L. (author), Perin, G. (author), Picek, S. (author)The deep learning-based side-channel analysis represents one of the most powerful side-channel attack approaches. Thanks to its capability in dealing with raw features and countermeasures, it becomes the de facto standard approach for the SCA community. The recent works significantly improved the deep learning-based attacks from various...conference paper 2022
- document
-
Arora, Vipul (author), Buhan, Ileana (author), Perin, G. (author), Picek, S. (author)Advances in cryptography have enabled the features of confidentiality, security, and integrity on small embedded devices such as IoT devices. While mathematically strong, the platform on which an algorithm is implemented plays a significant role in the security of the final product. Side-channel attacks exploit the variations in the system’s...conference paper 2022
- document
-
Mukhtar, Naila (author), Batina, Lejla (author), Picek, S. (author), Kong, Yinan (author)Deep learning-based side-channel analysis performance heavily depends on the dataset size and the number of instances in each target class. Both small and imbalanced datasets might lead to unsuccessful side-channel attacks. The attack performance can be improved by generating traces synthetically from the obtained data instances instead of...conference paper 2022
- document
-
Rijsdijk, Jorai (author), Wu, L. (author), Perin, G. (author)Deep learning-based side-channel attacks are capable of breaking targets protected with countermeasures. The constant progress in the last few years makes the attacks more powerful, requiring fewer traces to break a target. Unfortunately, to protect against such attacks, we still rely solely on methods developed to protect against generic...conference paper 2022
- document
-
Rezaeezade, A. (author), Perin, G. (author), Picek, S. (author)Profiling side-channel analysis allows evaluators to estimate the worst-case security of a target. When security evaluations relax the assumptions about the adversary’s knowledge, profiling models may easily be sub-optimal due to the inability to extract the most informative points of interest from the side-channel measurements. When used for...conference paper 2022
- document
-
Wu, L. (author), Perin, G. (author), Picek, S. (author)Deep learning-based side-channel analysis is rapidly positioning itself as a de-facto standard for the most powerful profiling side-channel analysis.The results from the last few years show that deep learning techniques can efficiently break targets that are even protected with countermeasures. While there are constant improvements in making...conference paper 2022
- document
-
Verrer, Daan (author)Modern implementations of encryption algorithms on CPU’s that use frequent memory lookups of precomputed functions, are vulnerable to Cache based SideChannel Attacks. The ρ-VEX processor, a runtime reconfigurable VLIW processor developed at the Computer and Quantum Engineering department at the TU Delft was identified to possibly allow for...master thesis 2021
- document
-
Slooff, Tom (author)One of the most potent attacks against cryptographic implementations nowadays is side-channel attacks. Side-channel attacks use unintended leakages in the implementation, for example, electromagnetic radiation, to retrieve the secret key. Over time side-channel attacks have become more powerful, and recently the community has shifted towards...master thesis 2021