Searched for: subject%3A%22deep%255C%252Blearning%22
(1 - 5 of 5)
document
Wu, L. (author), Perin, G. (author), Picek, S. (author)
In the last decade, machine learning-based side-channel attacks have become a standard option when investigating profiling side-channel attacks. At the same time, the previous state-of-the-art technique, template attack, started losing its importance and was more considered a baseline to compare against. As such, most of the results reported...
journal article 2022
document
Perin, G. (author), Wu, L. (author), Picek, S. (author)
One of the main promoted advantages of deep learning in profiling side-channel analysis is the possibility of skipping the feature engineering process. Despite that, most recent publications consider feature selection as the attacked interval from the side-channel measurements is pre-selected. This is similar to the worst-case security...
journal article 2022
document
Wu, L. (author), Perin, G. (author), Picek, S. (author)
Deep learning-based side-channel analysis is rapidly positioning itself as a de-facto standard for the most powerful profiling side-channel analysis.The results from the last few years show that deep learning techniques can efficiently break targets that are even protected with countermeasures. While there are constant improvements in making...
conference paper 2022
document
Rijsdijk, J. (author), Wu, L. (author), Perin, G. (author), Picek, S. (author)
Deep learning represents a powerful set of techniques for profiling side-channel analysis. The results in the last few years show that neural network architectures like multilayer perceptron and convolutional neural networks give strong attack performance where it is possible to break targets protected with various coun-termeasures....
journal article 2021
document
Perin, G. (author), Chmielewski, Łukasz (author), Batina, Lejla (author), Picek, S. (author)
To mitigate side-channel attacks, real-world implementations of public-key cryptosystems adopt state-of-the-art countermeasures based on randomization of the private or ephemeral keys. Usually, for each private key operation, a “scalar blinding” is performed using 32 or 64 randomly generated bits. Nevertheless, horizontal attacks based on a...
journal article 2020
Searched for: subject%3A%22deep%255C%252Blearning%22
(1 - 5 of 5)