Physical fault injection and side-channel attacks on mobile devices: A comprehensive analysis
Today's mobile devices contain densely packaged system-on-chips (SoCs) with multi-core,
high-frequency CPUs and complex pipelines. In parallel, sophisticated SoC-assisted …
high-frequency CPUs and complex pipelines. In parallel, sophisticated SoC-assisted …
Far field EM side-channel attack on AES using deep learning
We present the first deep learning-based side-channel attack on AES-128 using far field
electromagnetic emissions as a side channel. Our neural networks are trained on traces …
electromagnetic emissions as a side channel. Our neural networks are trained on traces …
Tandem deep learning side-channel attack on FPGA implementation of AES
Side-channel attacks have become a realistic threat to implementations of cryptographic
algorithms, especially with the help of deep-learning techniques. The majority of recently …
algorithms, especially with the help of deep-learning techniques. The majority of recently …
How diversity affects deep-learning side-channel attacks
Deep learning side-channel attacks are an emerging threat to the security of
implementations of cryptographic algorithms. The attacker first trains a model on a large set …
implementations of cryptographic algorithms. The attacker first trains a model on a large set …
Multi-source training deep-learning side-channel attacks
Recently, several deep-learning side-channel attacks on cryptographic algorithms were
demonstrated. With the help of a trained deep-learning model, the attacker extracts the key …
demonstrated. With the help of a trained deep-learning model, the attacker extracts the key …
Advanced far field EM side-channel attack on AES
Several attacks on AES using far field electromagnetic (EM) emission as a side channel
have been recently presented. Unlike power analysis or near filed EM analysis, far field EM …
have been recently presented. Unlike power analysis or near filed EM analysis, far field EM …
Deep learning assisted cross-family profiled side-channel attacks using transfer learning
Side-channel analysis (SCA) utilizing the power consumption of a device has proved to be
an efficient technique for recovering secret keys exploiting the implementation vulnerability …
an efficient technique for recovering secret keys exploiting the implementation vulnerability …
Federated learning in side-channel analysis
Recently introduced federated learning is an attractive framework for the distributed training
of deep learning models with thousands of participants. However, it can potentially be used …
of deep learning models with thousands of participants. However, it can potentially be used …
An electromagnetic side-channel-based security level detection measurement approach in content transfer remote mechanisms
Data confidentiality is a very crucial aspect of modern information society in several fields,
and particularly critical in case of telemedicine monitoring. Intrusion attempts represent a …
and particularly critical in case of telemedicine monitoring. Intrusion attempts represent a …
Deep Learning based Cryptanalysis of Stream Ciphers.
Conventional cryptanalysis techniques necessitate an extensive analysis of non-linear
functions defining the relationship of plain data, key, and corresponding cipher data. These …
functions defining the relationship of plain data, key, and corresponding cipher data. These …