2019
DOI: 10.1109/tifs.2018.2879295
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Profiled Attacks on Masking Schemes

Abstract: Side-channel adversaries represent real-world threats against (certified and uncertified) cryptographic devices. Masking schemes represent prevailing countermeasures to reduce the success probabilities of side-channel attacks. However, masking schemes increase the implementation cost in term of power consumption, clock cycles, and random number generation. Investigation of tools evaluating the degree of resilience of cryptographic devices using masking (against side-channel attacks) represents an important asp… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 12 publications
(8 citation statements)
references
References 26 publications
(46 reference statements)
0
8
0
Order By: Relevance
“…• Easier to interpret metrics. Lerman et al's analyzes compare profiling methods by first fixing a number of profiling and attack measurements followed by an evaluation of the attacks' probability of success [45].…”
Section: Contributionsmentioning
confidence: 99%
See 4 more Smart Citations
“…• Easier to interpret metrics. Lerman et al's analyzes compare profiling methods by first fixing a number of profiling and attack measurements followed by an evaluation of the attacks' probability of success [45].…”
Section: Contributionsmentioning
confidence: 99%
“…We further contextualize the attack settings based on adversarial capabilities and consider profiled attacks with known or unknown masking randomness. • Additional distinguishers The authors of [45] evaluate Gaussian TAs, Kernel Density Estimation (KDE) and Random Forests (RFs), but some natural candidates for the efficient profiling of masked implementations are still missing, for example the Expectation-Maximization (EM) algorithm to profile Gaussian mixtures [28], [50], Soft Analytical Side-Channel Attacks (SASCA) [51] and Multi-Layer Perceptrons (MLP) [52], [53]. We include these distinguishers in our experiments.…”
Section: Contributionsmentioning
confidence: 99%
See 3 more Smart Citations