The threat of offensive ai to organizations
AI has provided us with the ability to automate tasks, extract information from vast amounts of
data, and synthesize media that is nearly indistinguishable from the real thing. However …
data, and synthesize media that is nearly indistinguishable from the real thing. However …
Machine learning strategies for time series forecasting
The increasing availability of large amounts of historical data and the need of performing
accurate forecasting of future behavior in several scientific and applied domains demands …
accurate forecasting of future behavior in several scientific and applied domains demands …
A machine learning approach against a masked AES: Reaching the limit of side-channel attacks with a learning model
Side-channel attacks challenge the security of cryptographic devices. A widespread
countermeasure against these attacks is the masking approach. Masking combines …
countermeasure against these attacks is the masking approach. Masking combines …
X-DeepSCA: Cross-device deep learning side channel attack
This article, for the first time, demonstrates Cross-device Deep Learning Side-Channel
Attack (X-DeepSCA), achieving an accuracy of> 99.9%, even in presence of significantly …
Attack (X-DeepSCA), achieving an accuracy of> 99.9%, even in presence of significantly …
Neural network based attack on a masked implementation of AES
R Gilmore, N Hanley, M O'Neill - 2015 IEEE International …, 2015 - ieeexplore.ieee.org
Masked implementations of cryptographic algorithms are often used in commercial
embedded cryptographic devices to increase their resistance to side channel attacks. In this …
embedded cryptographic devices to increase their resistance to side channel attacks. In this …
Applications of machine learning techniques in side-channel attacks: a survey
With increasing expansion of the Internet of Things, embedded devices equipped with
cryptographic modules become an important factor to protect sensitive data. Even though …
cryptographic modules become an important factor to protect sensitive data. Even though …
Machine learning for hardware security: Opportunities and risks
Recently, machine learning algorithms have been utilized by system defenders and
attackers to secure and attack hardware, respectively. In this work, we investigate the impact …
attackers to secure and attack hardware, respectively. In this work, we investigate the impact …
Practical approaches toward deep-learning-based cross-device power side-channel attack
Power side-channel analysis (SCA) has been of immense interest to most embedded
designers to evaluate the physical security of the system. This work presents profiling-based …
designers to evaluate the physical security of the system. This work presents profiling-based …
Profiled side-channel analysis in the efficient attacker framework
Profiled side-channel attacks represent the most powerful category of side-channel attacks.
There, the attacker has access to a clone device to profile its leaking behavior. Additionally …
There, the attacker has access to a clone device to profile its leaking behavior. Additionally …
Profiling power analysis attack based on multi-layer perceptron network
In 2013, an innovative method of power analysis was presented in Martinasek and Zeman
(Radioengineering 22 (2), IF 0.687, 2013) and Martinasek et al.(Smart Card Research and …
(Radioengineering 22 (2), IF 0.687, 2013) and Martinasek et al.(Smart Card Research and …