Review on hybrid deep learning models for enhancing encryption techniques against side channel attacks

AA Ahmed, MK Hasan, AH Aman, N Safie… - IEEE …, 2024 - ieeexplore.ieee.org
During the years 2018-2024, considerable advancements have been achieved in the use of
deep learning for side channel attacks. The security of cryptographic algorithm …

Electrical-level attacks on CPUs, FPGAs, and GPUs: Survey and implications in the heterogeneous era

DG Mahmoud, V Lenders, M Stojilović - ACM Computing Surveys (CSUR …, 2022 - dl.acm.org
Given the need for efficient high-performance computing, computer architectures combining
central processing units (CPUs), graphics processing units (GPUs), and field-programmable …

Federated learning for privacy preservation of healthcare data from smartphone-based side-channel attacks

A Rehman, I Razzak, G Xu - IEEE Journal of Biomedical and …, 2022 - ieeexplore.ieee.org
Federated learning (FL) has recently emerged as a striking framework for allowing machine
and deep learning models with thousands of participants to have distributed training to …

Far field EM side-channel attack on AES using deep learning

R Wang, H Wang, E Dubrova - Proceedings of the 4th ACM Workshop …, 2020 - dl.acm.org
We present the first deep learning-based side-channel attack on AES-128 using far field
electromagnetic emissions as a side channel. Our neural networks are trained on traces …

Deep learning side-channel attack against hardware implementations of AES

T Kubota, K Yoshida, M Shiozaki, T Fu**o - Microprocessors and …, 2021 - Elsevier
In the field of image recognition, machine learning technologies, especially deep learning,
have been rapidly advancing alongside the advances of hardware such as GPUs. In image …

Breaking masked and shuffled CCA secure Saber KEM by power analysis

K Ngo, E Dubrova, T Johansson - Proceedings of the 5th Workshop on …, 2021 - dl.acm.org
In this paper, we show that a software implementation of CCA secure Saber KEM protected
by first-order masking and shuffling can be broken by deep learning-based power analysis …

Design and Implementation of Side Channel Attack Based on Deep Learning LSTM

AA Ahmed, MK Hasan - 2023 IEEE Region 10 Symposium …, 2023 - ieeexplore.ieee.org
Encryption algorithms and encryption devices both play a key role in ensuring the safety of
data that has been encrypted. Various types of attacks, such as energy analysis, can be …

Multi-leak deep-learning side-channel analysis

F Hu, H Wang, J Wang - IEEE Access, 2022 - ieeexplore.ieee.org
Deep Learning Side-Channel Attacks (DLSCAs) have become a realistic threat to
implementations of cryptographic algorithms, such as Advanced Encryption Standard (AES) …

Design of Lightweight Cryptography based Deep Learning Model for Side Channel Attacks

AA Ahmed, MK Hasan, NS Nafi… - 2023 33rd …, 2023 - ieeexplore.ieee.org
Depending on a device's encryption mechanism, a wide variety of tangible details could be
exposed. These leaks are used in side-channel analysis, which is used to get keys. Due to …

Advanced far field EM side-channel attack on AES

R Wang, H Wang, E Dubrova, M Brisfors - … of the 7th ACM on Cyber …, 2021 - dl.acm.org
Several attacks on AES using far field electromagnetic (EM) emission as a side channel
have been recently presented. Unlike power analysis or near filed EM analysis, far field EM …