The threat of offensive ai to organizations

Y Mirsky, A Demontis, J Kotak, R Shankar, D Gelei… - Computers & …, 2023 - Elsevier
AI has provided us with the ability to automate tasks, extract information from vast amounts of
data, and synthesize media that is nearly indistinguishable from the real thing. However …

Recent advances and trends in lightweight cryptography for IoT security

NA Gunathilake, A Al-Dubai… - 2020 16th International …, 2020 - ieeexplore.ieee.org
Lightweight cryptography is a novel diversion from conventional cryptography to minimise its
high level of resource requirements, thus it would impeccably fit in the internet-of-things (IoT) …

Applications of machine learning techniques in side-channel attacks: a survey

B Hettwer, S Gehrer, T Güneysu - Journal of Cryptographic Engineering, 2020 - Springer
With increasing expansion of the Internet of Things, embedded devices equipped with
cryptographic modules become an important factor to protect sensitive data. Even though …

On the performance of convolutional neural networks for side-channel analysis

S Picek, IP Samiotis, J Kim, A Heuser, S Bhasin… - Security, Privacy, and …, 2018 - Springer
In this work, we ask a question whether Convolutional Neural Networks are more suitable for
side-channel attacks than some other machine learning techniques and if yes, in what …

Remove some noise: On pre-processing of side-channel measurements with autoencoders

L Wu, S Picek - IACR Transactions on Cryptographic Hardware and …, 2020 - tches.iacr.org
In the profiled side-channel analysis, deep learning-based techniques proved to be very
successful even when attacking targets protected with countermeasures. Still, there is no …

[HTML][HTML] A substitution box for lightweight ciphers to secure internet of things

V Panchami, MM Mathews - Journal of King Saud University-Computer and …, 2023 - Elsevier
Abstract The Internet of Things is a resource-constrained device that demands lightweight
cryptographic solutions to achieve high performance and optimal security. In lightweight …

The best of two worlds: Deep learning-assisted template attack

L Wu, G Perin, S Picek - IACR Transactions on Cryptographic …, 2022 - tosc.iacr.org
In the last decade, machine learning-based side-channel attacks have become a standard
option when investigating profiling side-channel attacks. At the same time, the previous state …

Mind the portability: A warriors guide through realistic profiled side-channel analysis

S Bhasin, A Chattopadhyay, A Heuser… - NDSS 2020-Network …, 2020 - inria.hal.science
Profiled side-channel attacks represent a practical threat to digital devices, thereby having
the potential to disrupt the foundation of e-commerce, the Internet of Things (IoT), and smart …

SCAUL: Power side-channel analysis with unsupervised learning

K Ramezanpour, P Ampadu… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Existing power analysis techniques rely on strong adversary models with prior knowledge of
the leakage or training data. We introduce side-channel analysis with unsupervised learning …

Template attack versus Bayes classifier

S Picek, A Heuser, S Guilley - Journal of Cryptographic Engineering, 2017 - Springer
Side-channel attacks represent one of the most powerful categories of attacks on
cryptographic devices with profiled attacks in a prominent place as the most powerful among …