2021
DOI: 10.1109/access.2021.3117761
|View full text |Cite
|
Sign up to set email alerts
|

Deep K-TSVM: A Novel Profiled Power Side-Channel Attack on AES-128

Abstract: The appearance of deep neural networks for Side-Channel leads to strong power analysis techniques for detecting secret information of physical cryptography implementations. Generally, deep learning techniques do not suffer the difficulties of template attacks such as trace misalignment. However, the generalization of a trained deep neural network that can accurately predict Side-Channel leakages largely depends on its adjustable variables (parameters of a neural network). Although pre-training is no longer man… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 28 publications
(39 reference statements)
0
2
0
Order By: Relevance
“…The authors have used cloud-based gate arrays to investigate the vulnerabilities using a Bayesian neural network. A study on power attacks has also been carried out by Ghandali et al [28] using a combination of asymmetric encryption and a deep learning approach. The technique used asymmetric encryption via hardware implementation, wherein the Boltzmann learning technique is used for learning the probability of intrusion.…”
Section: Existing Approachesmentioning
confidence: 99%
See 1 more Smart Citation
“…The authors have used cloud-based gate arrays to investigate the vulnerabilities using a Bayesian neural network. A study on power attacks has also been carried out by Ghandali et al [28] using a combination of asymmetric encryption and a deep learning approach. The technique used asymmetric encryption via hardware implementation, wherein the Boltzmann learning technique is used for learning the probability of intrusion.…”
Section: Existing Approachesmentioning
confidence: 99%
“…(iii) The proposed scheme facilitates the verification of adjacent nodes as well as all other actors in a non-iterative way, which acts as a dual layer of security and increases the frequency of authentication suitable for an extensive dynamic network, unlike the existing approaches , which assess only single target nodes. iv) The proposed scheme is capable of resisting differential fault attacks, power-based attacks, timing attacks and cache attacks, which opens up many opportunities for fighting multiple variants of side-channel attacks, whereas existing approaches [24][25][26][27][28][29][30][31][32][33][34][35][36][37][38] are reported to resist only singular forms of attack.…”
Section: Accomplished Outcomementioning
confidence: 99%
“…It would be beneficial for deep learning-based side channel attack (DLSCA) to include deeper learning. Recent studies have shown that supervised machine learning (SML) can adapt deep learning features to improve the accuracy of key retrieval and classification [4]. In a number of different trials, deep learning has been shown to be more effective than side-channel attacks.…”
Section: Introductionmentioning
confidence: 99%