Review on hybrid deep learning models for enhancing encryption techniques against side channel attacks

AA Ahmed, MK Hasan, AH Aman, N Safie… - IEEE …, 2024 - ieeexplore.ieee.org
During the years 2018-2024, considerable advancements have been achieved in the use of
deep learning for side channel attacks. The security of cryptographic algorithm …

Electrical-level attacks on CPUs, FPGAs, and GPUs: Survey and implications in the heterogeneous era

DG Mahmoud, V Lenders, M Stojilović - ACM Computing Surveys (CSUR …, 2022 - dl.acm.org
Given the need for efficient high-performance computing, computer architectures combining
central processing units (CPUs), graphics processing units (GPUs), and field-programmable …

Federated learning for privacy preservation of healthcare data from smartphone-based side-channel attacks

A Rehman, I Razzak, G Xu - IEEE Journal of Biomedical and …, 2022 - ieeexplore.ieee.org
Federated learning (FL) has recently emerged as a striking framework for allowing machine
and deep learning models with thousands of participants to have distributed training to …

Far field EM side-channel attack on AES using deep learning

R Wang, H Wang, E Dubrova - Proceedings of the 4th ACM Workshop …, 2020 - dl.acm.org
We present the first deep learning-based side-channel attack on AES-128 using far field
electromagnetic emissions as a side channel. Our neural networks are trained on traces …

Deep learning side-channel attack against hardware implementations of AES

T Kubota, K Yoshida, M Shiozaki, T Fu**o - Microprocessors and …, 2021 - Elsevier
In the field of image recognition, machine learning technologies, especially deep learning,
have been rapidly advancing alongside the advances of hardware such as GPUs. In image …

Breaking masked and shuffled CCA secure Saber KEM by power analysis

K Ngo, E Dubrova, T Johansson - Proceedings of the 5th Workshop on …, 2021 - dl.acm.org
In this paper, we show that a software implementation of CCA secure Saber KEM protected
by first-order masking and shuffling can be broken by deep learning-based power analysis …

A survey on FPGA cybersecurity design strategies

A Proulx, JY Chouinard, P Fortier, A Miled - ACM Transactions on …, 2023 - dl.acm.org
This article presents a critical literature review on the security aspects of field-programmable
gate array (FPGA) devices. FPGA devices present unique challenges to cybersecurity …

Design of lightweight cryptography based deep learning model for side channel attacks

AA Ahmed, MK Hasan, NS Nafi… - 2023 33rd …, 2023 - ieeexplore.ieee.org
Depending on a device's encryption mechanism, a wide variety of tangible details could be
exposed. These leaks are used in side-channel analysis, which is used to get keys. Due to …

Multi-leak deep-learning side-channel analysis

F Hu, H Wang, J Wang - IEEE Access, 2022 - ieeexplore.ieee.org
Deep Learning Side-Channel Attacks (DLSCAs) have become a realistic threat to
implementations of cryptographic algorithms, such as Advanced Encryption Standard (AES) …

Single-trace side-channel attacks on CRYSTALS-Dilithium: Myth or reality?

R Wang, K Ngo, J Gärtner, E Dubrova - Cryptology ePrint Archive, 2023 - eprint.iacr.org
We present a side-channel attack on CRYSTALS-Dilithium, a post-quantum secure digital
signature scheme, with two variants of post-processing. The side-channel attack exploits …