2018
DOI: 10.1109/tifs.2017.2757440
|View full text |Cite
|
Sign up to set email alerts
|

Efficient, Portable Template Attacks

Abstract: Cambridge. His research interests include hardware and signal-processing aspects of computer security, in particular compromising emanations, side-channel attacks, distance bounding protocols, and the security of RFID and navigation systems.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
49
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 62 publications
(49 citation statements)
references
References 31 publications
(89 reference statements)
0
49
0
Order By: Relevance
“…In [4], Choudary and Kuhn present a so-called portable template attack that is able to recover key bytes from a hardware implementation of the Advanced Encryption Standard on an ATMEL AVR XMEGA 8-bit microcontroller with 85% success rate. They present several methods to reduce numerical problems that happen during the statistical calculations related to a practical template attack.…”
Section: Previous Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In [4], Choudary and Kuhn present a so-called portable template attack that is able to recover key bytes from a hardware implementation of the Advanced Encryption Standard on an ATMEL AVR XMEGA 8-bit microcontroller with 85% success rate. They present several methods to reduce numerical problems that happen during the statistical calculations related to a practical template attack.…”
Section: Previous Workmentioning
confidence: 99%
“…Usually, they rely on a large amount of accurate and high quality profiling traces, which makes them almost impractical in many cases, specifically when there are only a limited number of power traces with low signal-to-noise ratio. Machine learning (ML) based methods can prevent these problems, and are found to perform better than previously known techniques when faced with complexity in numerical and statistical calculations or some of the restrictive assumptions on noise distribution [4][5][6][7][8][9][10][11][12][13][14][15]. Power analysis attacks compromise the security of cryptographic devices through analyzing their power consumption.…”
Section: Introductionmentioning
confidence: 99%
“…To the best of our knowledge, both data sets consist of traces captured from one single device, which are not suitable for current work. Hence, we collected new traces from 30 different 8-bit AVR microcontrollers running [10], [30], [19], [18], [20], [31] Cross-device Attack Template Attack [14], [13], [32], [15] Neural Networks [21], [22], This Work the AES-128 algorithm using the ChipWhisperer platform [24] (Figure 2). Although 8-bit microcontrollers are becoming less preferred for encryption engines nowadays, recent body of work ( [13], [18], [37], [38], [39]) investigated performance of Profiled SCA attack using datasets gathered from 8-bit microcontrollers.…”
Section: A Related Workmentioning
confidence: 99%
“…Side-channel analysis has attracted a great attention since timing attacks were introduced by Kocher in 1996 [2]. A variety of efficient approaches have proposed in the past 20 years, such as differential power analysis (DPA) [3], correlation power analysis (CPA) [4], template analysis (TA) [5,6], fault analysis (FA) [7], electromagnetic analysis (EMA) [8][9][10][11][12] and so on. For DPA, plenty of power traces are statistically computed to reveal the power consumption difference caused by different intermediate values and then the difference is used to recover the key.…”
Section: Introductionmentioning
confidence: 99%