2023
DOI: 10.1002/cta.3583
|View full text |Cite
|
Sign up to set email alerts
|

A machine learning low‐dropout regulator‐assisted differential power analysis attack countermeasure with voltage scaling

Abstract: Summary False key‐controlled aggressive voltage scaling (FKCAVS) technique is a lightweight and effective leakage power analysis (LPA) attack countermeasure. However, the regular FKCAVS technique may not be utilized as a countermeasure against differential power analysis (DPA) attacks unconditionally. The primary reason is that the working frequency of DPA attacks is significantly higher than the corresponding frequency of LPA attacks. Thus, it is difficult to make the speed of voltage scaling keep pace with t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 26 publications
0
1
0
Order By: Relevance
“…Power analysis attacks are side-channel attacks that exploit the power consumption of a device to infer sensitive information, such as encryption keys, passwords, or user activities [162]. These attacks can be classified into two major categories as (1) simple power analysis (SPA), which involves observing the power consumption of a device and identifying patterns or features that reveal information; and (2) differential power analysis (DPA), which involves collecting the multiple power traces of a device and applying statistical analysis to extract information.…”
Section: Power Analysis Attacksmentioning
confidence: 99%
“…Power analysis attacks are side-channel attacks that exploit the power consumption of a device to infer sensitive information, such as encryption keys, passwords, or user activities [162]. These attacks can be classified into two major categories as (1) simple power analysis (SPA), which involves observing the power consumption of a device and identifying patterns or features that reveal information; and (2) differential power analysis (DPA), which involves collecting the multiple power traces of a device and applying statistical analysis to extract information.…”
Section: Power Analysis Attacksmentioning
confidence: 99%
“…DL-SCA with unsupervised learning is suitable for scenarios where the key is unknown and a substantial volume of unlabeled power traces are available [5][6][7]. Although this type of DL-SCA exhibits significant advantages over traditional non-profiling SCAs such as DPA [8] and CPA [9], it still presents certain gaps when compared to DL-SCA with supervised learning. DL-SCA with semi-supervised learning overcomes the limitations of the previous two types of DL-SCA, enabling key recovery even when labeled power traces are scarce.…”
Section: Introductionmentioning
confidence: 99%