A survey on fault attacks on symmetric key cryptosystems

A Baksi, S Bhasin, J Breier, D Jap, D Saha - ACM Computing Surveys, 2022 - dl.acm.org
Fault attacks are among the well-studied topics in the area of cryptography. These attacks
constitute a powerful tool to recover the secret key used in the encryption process. Fault …

Machine learning and hardware security: Challenges and opportunities

F Regazzoni, S Bhasin, AA Pour, I Alshaer… - Proceedings of the 39th …, 2020 - dl.acm.org
Machine learning techniques have significantly changed our lives. They helped improving
our everyday routines, but they also demonstrated to be an extremely helpful tool for more …

Intelligent UAVs trajectory optimization from space-time for data collection in social networks

X Liu, H Song, A Liu - IEEE Transactions on Network Science …, 2020 - ieeexplore.ieee.org
With rapid development of artificial intelligence (AI) technology, social network (SN) can use
AI to extract useful knowledge of users to improve the quality of peoples lives. Although AI …

Side-channel fuzzy analysis-based AI model extraction attack with information-theoretic perspective in intelligent IoT

Q Pan, J Wu, AK Bashir, J Li… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Accessibility to smart devices provides opportunities for side-channel attacks (SCAs) on
artificial intelligent (AI) models in the intelligent Internet of Things (IoT). However, the existing …

A deep learning approach for active S-box prediction of lightweight generalized feistel block ciphers

MF Idris, JS Teh, JLS Yan, WZ Yeoh - IEEE Access, 2021 - ieeexplore.ieee.org
One of the main security requirements for symmetric-key block ciphers is resistance against
differential cryptanalysis. This is commonly assessed by counting the number of active …

Learn from your faults: leakage assessment in fault attacks using deep learning

S Saha, M Alam, A Bag, D Mukhopadhyay… - Journal of …, 2023 - Springer
Generic vulnerability assessment of cipher implementations against Fault Attacks (FA) is a
largely unexplored research area. Security assessment against FA is critical for FA …

Classical and physical security of symmetric key cryptographic algorithms

A Baksi - 2021 IFIP/IEEE 29th International Conference on Very …, 2021 - ieeexplore.ieee.org
Symmetric key cryptography is one of the cornerstones of security in the modern era of
electronic communication. The symmetric key algorithms, known as the ciphers, are to …

SAFARI: Automatic synthesis of fault-attack resistant block cipher implementations

I Roy, C Rebeiro, A Hazra… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Most cipher implementations are vulnerable to a class of cryptanalytic attacks known as fault
injection attacks. To reveal the secret key, these attacks make use of faults induced at …

Investigating deep learning approaches on the security analysis of cryptographic algorithms

BY Chong, I Salam - Cryptography, 2021 - mdpi.com
This paper studies the use of deep learning (DL) models under a known-plaintext scenario.
The goal of the models is to predict the secret key of a cipher using DL techniques. We …

Multi-source fault injection detection using machine learning and sensor fusion

RR Shrivastwa, S Guilley, JL Danger - International Conference on …, 2021 - Springer
Fault attacks have raised serious concern with the growing amount of connected devices.
Even a small vulnerability might compromise a complete network. It is therefore important to …