Lejla Batina
14 records found
1
Authored
Regularizers to the rescue
Fighting overfitting in deep learning-based side-channel analysis
Despite considerable achievements of deep learning-based side-channel analysis, overfitting represents a significant obstacle in finding optimized neural network models. This issue is not unique to the side-channel domain. Regularization techniques are popular solutions to ove ...
SoK
Deep Learning-based Physical Side-channel Analysis
Side-channel attacks represent a realistic and serious threat to the security of embedded devices for already almost three decades. A variety of attacks and targets they can be applied to have been introduced, and while the area of side-channel attacks and their mitigation is ...
SCA Strikes Back
Reverse Engineering Neural Network Architectures using Side Channels
This paper was selected for Top Picks in Hardware and Embedded Security 2020 and it presents a physical side-channel attack aiming at reverse engineering neural networks implemented on an edge device. The attack does not need access to training data and allows for neural netwo ...
Fake It Till You Make It
Data Augmentation Using Generative Adversarial Networks for All the Crypto You Need on Small Devices
Deep learning-based side-channel analysis performance heavily depends on the dataset size and the number of instances in each target class. Both small and imbalanced datasets might lead to unsuccessful side-channel attacks. The attack performance can be improved by generating ...
Deep Neural Networks Aiding Cryptanalysis
A Case Study of the Speck Distinguisher
At CRYPTO’19, A. Gohr proposed neural distinguishers for the lightweight block cipher Speck32/64, achieving better results than the state-of-the-art at that point. However, the motivation for using that particular architecture was not very clear; therefore, in this paper, we s ...
Keep it Unsupervised
Horizontal Attacks Meet Deep Learning
CSI NN
Reverse engineering of neural network architectures through electromagnetic side channel
One trace is all it takes
Machine learning-based side-channel attack on EDDSA
Profiling attacks, especially those based on machine learning proved as very successful techniques in recent years when considering side-channel analysis of block ciphers implementations. At the same time, the results for implementations of public-key cryptosystems are very sp ...