2014 Tenth International Conference on Computational Intelligence and Security 2014
DOI: 10.1109/cis.2014.80
|View full text |Cite
|
Sign up to set email alerts
|

An Improved Side-Channel Attack Based on Support Vector Machine

Abstract: Side-channel attack (SCA) is a very efficient cryptanalysis technology to attack cryptographic devices. It takes advantage of physical information leakages to recover the cryptographic key. In order to strengthen the power to extract the cryptographic key-relevant information, this article introduces the Support Vector Machine technologies. Taking a software implementation of masked AES-256 on an Atmel ATMega-163 smart card, we applied an improved profiled side-channel attack to recover the cryptographic key. … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(5 citation statements)
references
References 15 publications
(20 reference statements)
0
4
0
Order By: Relevance
“…Support Vector Machine (SVM). Support Vector Machines are one of the most popular algorithms used for classification problems in different application domains, including side-channel analysis [19,33,57]. In SVM, n-dimensional data is separated using a hyperplane, by computing and adjusting the coefficients to find the maximum-margin hyperlane, which best separates the target classes.…”
Section: Machine Learning Algorithmsmentioning
confidence: 99%
“…Support Vector Machine (SVM). Support Vector Machines are one of the most popular algorithms used for classification problems in different application domains, including side-channel analysis [19,33,57]. In SVM, n-dimensional data is separated using a hyperplane, by computing and adjusting the coefficients to find the maximum-margin hyperlane, which best separates the target classes.…”
Section: Machine Learning Algorithmsmentioning
confidence: 99%
“…They used a support vector machine as the classifier of their model to find the secret mask. After that, they attacked each SBox with computing and use the hamming weight of the output byte of the mask SBox as the label of the model to retrieve the secret key [16]. However, the success rate in this model completely depends on the number of sample points.…”
Section: ) Deep Learning Based Profiling Scasmentioning
confidence: 99%
“…In 2019, Hettwer et al [5] directly used the secret key as a label of the model; they also claimed that this would give more ability to the network to learn the most meaningful features of the leakage which is needed for classification. Additionally, there have been studies in supervised machine learning-based profiling side-channel attacks such as [14]- [16], [22] which use support vector machine, LS-SVM, KNN, and RF for the classification problem. In most cases still, a large number of traces is required to reach a stable key rank.…”
Section: ) Performance Metricsmentioning
confidence: 99%
“…We have performed comparative analysis of six machine/deep learning models, including multi-layer perceptron (MLP), support vector machines (SVM), random forest (RF), Naive Bayes (NB), decision tree (Tree), and K-nearest neighbors (kNN). [49][50][51] However, in this section the details of the best performing machine learning model, MLP, are provided. For analysis in this research, neural network-based SCA model has shown tremendous performance improvement for secret key recovery.…”
Section: Training Model Characteristicsmentioning
confidence: 99%