Sok: Deep learning-based physical side-channel analysis

S Picek, G Perin, L Mariot, L Wu, L Batina - ACM Computing Surveys, 2023 - dl.acm.org
Side-channel attacks represent a realistic and serious threat to the security of embedded
devices for already almost three decades. A variety of attacks and targets they can be …

I choose you: Automated hyperparameter tuning for deep learning-based side-channel analysis

L Wu, G Perin, S Picek - IEEE Transactions on Emerging …, 2022 - ieeexplore.ieee.org
Today, the deep learning-based side-channel analysis represents a widely researched
topic, with numerous results indicating the advantages of such an approach. Indeed …

Exploring feature selection scenarios for deep learning-based side-channel analysis

G Perin, L Wu, S Picek - IACR Transactions on Cryptographic …, 2022 - research.tudelft.nl
One of the main promoted advantages of deep learning in profiling side-channel analysis is
the possibility of skip** the feature engineering process. Despite that, most recent …

Applications of machine learning techniques in side-channel attacks: a survey

B Hettwer, S Gehrer, T Güneysu - Journal of Cryptographic Engineering, 2020 - Springer
With increasing expansion of the Internet of Things, embedded devices equipped with
cryptographic modules become an important factor to protect sensitive data. Even though …

Best information is most successful

E De Chérisey, S Guilley, O Rioul… - Cryptology ePrint …, 2019 - eprint.iacr.org
Using information-theoretic tools, this paper establishes a mathematical link between the
probability of success of a side-channel attack and the minimum number of queries to reach …

Ranking loss: Maximizing the success rate in deep learning side-channel analysis

G Zaid, L Bossuet, F Dassance, A Habrard… - IACR Transactions on …, 2021 - tches.iacr.org
The side-channel community recently investigated a new approach, based on deep
learning, to significantly improve profiled attacks against embedded systems. Compared to …

Mind the portability: A warriors guide through realistic profiled side-channel analysis

S Bhasin, A Chattopadhyay, A Heuser… - NDSS 2020-Network …, 2020 - inria.hal.science
Profiled side-channel attacks represent a practical threat to digital devices, thereby having
the potential to disrupt the foundation of e-commerce, the Internet of Things (IoT), and smart …

Information theory-based evolution of neural networks for side-channel analysis

RY Acharya, F Ganji, D Forte - IACR Transactions on Cryptographic …, 2023 - icscm.ub.rub.de
Profiled side-channel analysis (SCA) leverages leakage from cryptographic
implementations to extract the secret key. When combined with advanced methods in neural …

One trace is all it takes: Machine learning-based side-channel attack on eddsa

L Weissbart, S Picek, L Batina - … 2019, Gandhinagar, India, December 3–7 …, 2019 - Springer
Profiling attacks, especially those based on machine learning proved as very successful
techniques in recent years when considering side-channel analysis of block ciphers …

Fake it till you make it: Data augmentation using generative adversarial networks for all the crypto you need on small devices

N Mukhtar, L Batina, S Picek, Y Kong - Cryptographers' Track at the RSA …, 2022 - Springer
Deep learning-based side-channel analysis performance heavily depends on the dataset
size and the number of instances in each target class. Both small and imbalanced datasets …