Secure AI for 6G mobile devices: Deep learning optimization against side-channel attacks

AA Ahmed, MK Hasan, I Memon… - IEEE Transactions …, 2024 - ieeexplore.ieee.org
Deep learning-driven side-channel analysis (SCA) is a promising approach to side-channel
analytic profiling. Recent studies have shown that neural networks can successfully attack …

Autoencoder-enabled model portability for reducing hyperparameter tuning efforts in side-channel analysis

M Krček, G Perin - Journal of Cryptographic Engineering, 2024 - Springer
Hyperparameter tuning represents one of the main challenges in deep learning-based
profiling side-channel analysis. For each different side-channel dataset, the typical …

Side-channel attacks on mobile and IoT devices for Cyber–Physical systems

M Conti, E Losiouk, R Poovendran, R Spolaor - Computer Networks, 2022 - Elsevier
The attacks that leverage the side-channels produced by processes running on mobile and
IoT devices are a concrete threat for cyber–physical systems. This special issue is focused …

Playing with blocks: toward re-usable deep learning models for side-channel profiled attacks

S Paguada, L Batina, I Buhan… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
This paper introduces a deep learning modular network for side-channel analysis. Our
approach features a deep learning architecture with the capability to exchange parts …

[HTML][HTML] A Practical Non-Profiled Deep-Learning-Based Power Analysis with Hybrid-Supervised Neural Networks

F Kong, X Wang, K Pu, J Zhang, H Dang - Electronics, 2023 - mdpi.com
With the rapid advancement of deep learning, the neural network has become the primary
approach for non-profiled side-channel attacks. Nevertheless, challenges arise in practical …

A Novel Side-Channel Archive Framework Using Deep Learning-based Leakage Compression

S Jung, S **, H Kim - IEEE Access, 2024 - ieeexplore.ieee.org
Side-channel analysis is one of the vulnerabilities in IoT's cryptographic systems. To present
reliable side-channel analysis results, it is crucial to collect considerable amounts of power …

Side-channel attack using word embedding and long short term memories

Z Liu, Z Wang, M Ling - Journal of Web Engineering, 2022 - ieeexplore.ieee.org
Side-channel attack (SCA) based on machine learning has proved to be a valid technique in
cybersecurity, especially subjecting to the symmetric-key crypto implementations in serial …

TSCL: A time–space crossing location for side-channel leakage detection

Y Li, J Zhu, M Tang, S Ren, F Wu - Computer Networks, 2022 - Elsevier
Cryptographic algorithms on devices are vulnerable to the so-called side-channel attacks
(SCAs). The security evaluation of the cryptographic circuits is necessary to provide earlier …

Advantages of unsupervised learning analysis methods in single-trace SCA attacks

M Aftowicz, I Kabin, Z Dyka, P Langendoerfer - Microprocessors and …, 2024 - Elsevier
Abstract Machine learning techniques are commonly employed in the context of Side
Channel Analysis attacks. The clustering algorithms can be successfully used as classifiers …

Keep it unbiased: a comparison between estimation of distribution algorithms and deep learning for human interaction-free side-channel analysis

U Rioja, L Batina, I Armendariz, JL Flores - Journal of Cryptographic …, 2024 - Springer
Evaluating side-channel analysis (SCA) security is a complex process, involving applying
several techniques whose success depends on human engineering. Therefore, it is crucial …