A survey on hardware security: Current trends and challenges

S Akter, K Khalil, M Bayoumi - IEEe Access, 2023 - ieeexplore.ieee.org
Hardware security has become a critical concern due to the globalization of the Integrated
Circuit (IC) supply chain and the complex network connections of computing-intensive …

[PDF][PDF] Dual-leak: Deep unsupervised active learning for cross-device profiled side-channel leakage analysis

H Yu, S Wang, H Shan, M Panoff, M Lee… - 2023 IEEE International …, 2023 - par.nsf.gov
Deep Learning (DL)-based side-channel analysis (SCA), as a new branch of SCA attacks,
poses a significant privacy and security threat to implementations of cryptographic …

Securing CPS Through Simultaneous Analog Side-Channel Monitoring of Cyber and Physical Domains

A Kacmarcik, M Prvulovic - IEEE Access, 2024 - ieeexplore.ieee.org
The continuing proliferation of Cyber Physical Systems (CPSs), those that integrate
electronic control circuitry with a mechanical system allowing software commands to affect …

[HTML][HTML] Single Trace Analysis of Visible vs. Invisible Leakage for Comparison-Operation-Based CDT Sampling

KH Choi, J Han, DG Han - Electronics, 2024 - mdpi.com
The emergence of quantum computers poses a significant threat to the security of
conventional public-key cryptosystems, driving the demand for quantum-resistant …

An efficient heuristic power analysis framework based on hill-climbing algorithm

S Sun, S Ding, A Wang, Y Ding, C Wei, L Zhu… - Information Sciences, 2024 - Elsevier
Traditional nonprofiling side-channel analysis frequently adopts divide-and-conquer
strategy to recover the secret key of a cryptographic algorithm. Only a single key byte is …

Adaptive Chosen-Plaintext Deep Learning-Based Side-Channel Analysis

Y Li, Y Huang, Y Guo, C Ge, F Kong… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
Profiled side-channel analysis presents a significant risk to embedded devices in Internet of
Things (IoT). Typically, a single trace is insufficient to successfully key recovery in practical …

MCA-based multi-channel fusion attacks against cryptographic implementations

W Yang, X **ang, C Huang, A Fu… - IEEE Journal on …, 2023 - ieeexplore.ieee.org
Multi-channel fusion attacks (MCFAs) are a more effective kind of side-channel analysis
approaches for evaluating the side-channel vulnerability of a cryptographic device as …

[PDF][PDF] Deep learning-enhanced side-channel analysis of cryptographic implementations

B Hettwer - 2021 - d-nb.info
Integrated microelectronic system are ubiquitous nowadays-no computer, no car, and no
identity card could operate today without microelectronics or embedded systems in general …

[PDF][PDF] Secure and efficient hardware implementations for modern cryptography

J Richter-Brockmann - 2023 - hss-opus.ub.ruhr-uni-bochum.de
In our contemporary life, digital infrastructure plays a crucial role and it is almost impossible
to imagine a modern world without the advantages provided by highly advanced technology …

Apprentissage automatique pour les attaques par canaux auxiliaires

C Genevey-Metat - 2023 - theses.hal.science
Nowadays, embedded systems are more numerous and widespread in the real world.
These systems are vulnerable to side channel attacks. Such attacks consist in exploiting …