Sok: Deep learning-based physical side-channel analysis
Side-channel attacks represent a realistic and serious threat to the security of embedded
devices for already almost three decades. A variety of attacks and targets they can be …
devices for already almost three decades. A variety of attacks and targets they can be …
I choose you: Automated hyperparameter tuning for deep learning-based side-channel analysis
Today, the deep learning-based side-channel analysis represents a widely researched
topic, with numerous results indicating the advantages of such an approach. Indeed …
topic, with numerous results indicating the advantages of such an approach. Indeed …
Exploring feature selection scenarios for deep learning-based side-channel analysis
One of the main promoted advantages of deep learning in profiling side-channel analysis is
the possibility of skip** the feature engineering process. Despite that, most recent …
the possibility of skip** the feature engineering process. Despite that, most recent …
Applications of machine learning techniques in side-channel attacks: a survey
With increasing expansion of the Internet of Things, embedded devices equipped with
cryptographic modules become an important factor to protect sensitive data. Even though …
cryptographic modules become an important factor to protect sensitive data. Even though …
Best information is most successful
Using information-theoretic tools, this paper establishes a mathematical link between the
probability of success of a side-channel attack and the minimum number of queries to reach …
probability of success of a side-channel attack and the minimum number of queries to reach …
Ranking loss: Maximizing the success rate in deep learning side-channel analysis
The side-channel community recently investigated a new approach, based on deep
learning, to significantly improve profiled attacks against embedded systems. Compared to …
learning, to significantly improve profiled attacks against embedded systems. Compared to …
Mind the portability: A warriors guide through realistic profiled side-channel analysis
Profiled side-channel attacks represent a practical threat to digital devices, thereby having
the potential to disrupt the foundation of e-commerce, the Internet of Things (IoT), and smart …
the potential to disrupt the foundation of e-commerce, the Internet of Things (IoT), and smart …
Information theory-based evolution of neural networks for side-channel analysis
Profiled side-channel analysis (SCA) leverages leakage from cryptographic
implementations to extract the secret key. When combined with advanced methods in neural …
implementations to extract the secret key. When combined with advanced methods in neural …
One trace is all it takes: Machine learning-based side-channel attack on eddsa
Profiling attacks, especially those based on machine learning proved as very successful
techniques in recent years when considering side-channel analysis of block ciphers …
techniques in recent years when considering side-channel analysis of block ciphers …
Fake it till you make it: Data augmentation using generative adversarial networks for all the crypto you need on small devices
Deep learning-based side-channel analysis performance heavily depends on the dataset
size and the number of instances in each target class. Both small and imbalanced datasets …
size and the number of instances in each target class. Both small and imbalanced datasets …