Sok: Deep learning-based physical side-channel analysis
Side-channel attacks represent a realistic and serious threat to the security of embedded
devices for already almost three decades. A variety of attacks and targets they can be …
devices for already almost three decades. A variety of attacks and targets they can be …
An overview of hardware security and trust: Threats, countermeasures, and design tools
Hardware security and trust have become a pressing issue during the last two decades due
to the globalization of the semiconductor supply chain and ubiquitous network connection of …
to the globalization of the semiconductor supply chain and ubiquitous network connection of …
Deep learning for side-channel analysis and introduction to ASCAD database
R Benadjila, E Prouff, R Strullu, E Cagli… - Journal of Cryptographic …, 2020 - Springer
Recent works have demonstrated that deep learning algorithms were efficient to conduct
security evaluations of embedded systems and had many advantages compared to the other …
security evaluations of embedded systems and had many advantages compared to the other …
Breaking cryptographic implementations using deep learning techniques
H Maghrebi, T Portigliatti, E Prouff - Security, Privacy, and Applied …, 2016 - Springer
Template attack is the most common and powerful profiled side channel attack. It relies on a
realistic assumption regarding the noise of the device under attack: the probability density …
realistic assumption regarding the noise of the device under attack: the probability density …
Make some noise. unleashing the power of convolutional neural networks for profiled side-channel analysis
Profiled side-channel analysis based on deep learning, and more precisely Convolutional
Neural Networks, is a paradigm showing significant potential. The results, although scarce …
Neural Networks, is a paradigm showing significant potential. The results, although scarce …
[HTML][HTML] Secure authentication and privacy-preserving techniques in Vehicular Ad-hoc NETworks (VANETs)
In the last decade, there has been growing interest in Vehicular Ad Hoc NETworks
(VANETs). Today car manufacturers have already started to equip vehicles with …
(VANETs). Today car manufacturers have already started to equip vehicles with …
Reinforcement learning for hyperparameter tuning in deep learning-based side-channel analysis
Deep learning represents a powerful set of techniques for profiling side-channel analysis.
The results in the last few years show that neural network architectures like multilayer …
The results in the last few years show that neural network architectures like multilayer …
The curse of class imbalance and conflicting metrics with machine learning for side-channel evaluations
We concentrate on machine learning techniques used for profiled sidechannel analysis in
the presence of imbalanced data. Such scenarios are realistic and often occurring, for …
the presence of imbalanced data. Such scenarios are realistic and often occurring, for …
A survey on chip to system reverse engineering
The reverse engineering (RE) of electronic chips and systems can be used with honest and
dishonest intentions. To inhibit RE for those with dishonest intentions (eg, piracy and …
dishonest intentions. To inhibit RE for those with dishonest intentions (eg, piracy and …
Methodology for efficient CNN architectures in profiling attacks
The side-channel community recently investigated a new approach, based on deep
learning, to significantly improve profiled attacks against embedded systems. Previous …
learning, to significantly improve profiled attacks against embedded systems. Previous …