How machine learning changes the nature of cyberattacks on IoT networks: A survey
The Internet of Things (IoT) has continued gaining in popularity and importance in everyday
life in recent years. However, this development does not only present advantages. Indeed …
life in recent years. However, this development does not only present advantages. Indeed …
Deep learning for side-channel analysis and introduction to ASCAD database
R Benadjila, E Prouff, R Strullu, E Cagli… - Journal of Cryptographic …, 2020 - Springer
Recent works have demonstrated that deep learning algorithms were efficient to conduct
security evaluations of embedded systems and had many advantages compared to the other …
security evaluations of embedded systems and had many advantages compared to the other …
A comprehensive study of deep learning for side-channel analysis
Recently, several studies have been published on the application of deep learning to
enhance Side-Channel Attacks (SCA). These seminal works have practically validated the …
enhance Side-Channel Attacks (SCA). These seminal works have practically validated the …
Recent advances in deep learning‐based side‐channel analysis
As side‐channel analysis and machine learning algorithms share the same objective of
classifying data, numerous studies have been proposed for adapting machine learning to …
classifying data, numerous studies have been proposed for adapting machine learning to …
Pay attention to raw traces: A deep learning architecture for end-to-end profiling attacks
With the renaissance of deep learning, the side-channel community also notices the
potential of this technology, which is highly related to the profiling attacks in the side-channel …
potential of this technology, which is highly related to the profiling attacks in the side-channel …
Applications of machine learning techniques in side-channel attacks: a survey
With increasing expansion of the Internet of Things, embedded devices equipped with
cryptographic modules become an important factor to protect sensitive data. Even though …
cryptographic modules become an important factor to protect sensitive data. Even though …
Far field EM side-channel attack on AES using deep learning
We present the first deep learning-based side-channel attack on AES-128 using far field
electromagnetic emissions as a side channel. Our neural networks are trained on traces …
electromagnetic emissions as a side channel. Our neural networks are trained on traces …
Practical approaches toward deep-learning-based cross-device power side-channel attack
Power side-channel analysis (SCA) has been of immense interest to most embedded
designers to evaluate the physical security of the system. This work presents profiling-based …
designers to evaluate the physical security of the system. This work presents profiling-based …
Tandem deep learning side-channel attack on FPGA implementation of AES
Side-channel attacks have become a realistic threat to implementations of cryptographic
algorithms, especially with the help of deep-learning techniques. The majority of recently …
algorithms, especially with the help of deep-learning techniques. The majority of recently …
Gradient visualization for general characterization in profiling attacks
Abstract In Side-Channel Analysis (SCA), several papers have shown that neural networks
could be trained to efficiently extract sensitive information from implementations running on …
could be trained to efficiently extract sensitive information from implementations running on …