2014 IEEE Workshop on Signal Processing Systems (SiPS) 2014
DOI: 10.1109/sips.2014.6986091
|View full text |Cite
|
Sign up to set email alerts
|

Empirical evaluation of multi-device profiling side-channel attacks

Abstract: Side-channel analysis of cryptographic systems can allow for the recovery of secret information by an adversary even where the underlying algorithms have been shown to be provably secure. This is achieved by exploiting the unintentional leakages inherent in the underlying implementation of the algorithm in software or hardware. Within this field of research, a class of attacks known as profiling attacks, or more specifically as used here template attacks, have been shown to be extremely efficient at extracting… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
2
2
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(7 citation statements)
references
References 29 publications
(34 reference statements)
0
7
0
Order By: Relevance
“…In this paper we mainly use profiled correlation attacks, therefore we focus on trace normalization rather than on machine learning based approaches. Literature shows that, while interdevice variations and other differences have a huge impact on the performance of vanilla template attacks, using simple normalization techniques (e.g., offset removal and variance normalization) can significantly reduce the problem [MBTL13,EG12,CK14,HOTM14,CK14]. Templates built from multiple devices are more robust, but they are less effective for a single device [RSV + 11, HOTM14,CK14].…”
Section: Contributions Our Novel Contributions Arementioning
confidence: 99%
See 1 more Smart Citation
“…In this paper we mainly use profiled correlation attacks, therefore we focus on trace normalization rather than on machine learning based approaches. Literature shows that, while interdevice variations and other differences have a huge impact on the performance of vanilla template attacks, using simple normalization techniques (e.g., offset removal and variance normalization) can significantly reduce the problem [MBTL13,EG12,CK14,HOTM14,CK14]. Templates built from multiple devices are more robust, but they are less effective for a single device [RSV + 11, HOTM14,CK14].…”
Section: Contributions Our Novel Contributions Arementioning
confidence: 99%
“…The main disadvantage of z-score normalization is that the average and standard deviation are hard to estimate on a small number of attack traces. For this reason, it might be better to normalize each trace individually by subtracting it with its average value [HOTM14,CK14], or to normalize the attack set using the mean and standard deviation estimated on the profile set [HOTM14].…”
Section: Studying and Improving The Portability Of Profilesmentioning
confidence: 99%
“…To the best of our knowledge, both data sets consist of traces captured from one single device, which are not suitable for current work. Hence, we collected new traces from 30 different 8-bit AVR microcontrollers running [10], [30], [19], [18], [20], [31] Cross-device Attack Template Attack [14], [13], [32], [15] Neural Networks [21], [22], This Work the AES-128 algorithm using the ChipWhisperer platform [24] (Figure 2). Although 8-bit microcontrollers are becoming less preferred for encryption engines nowadays, recent body of work ( [13], [18], [37], [38], [39]) investigated performance of Profiled SCA attack using datasets gathered from 8-bit microcontrollers.…”
Section: A Related Workmentioning
confidence: 99%
“…Table 1 summarizes the related works. As can be seen, most of the template attacks were evaluated on the same device, whereas only in a few cases, ( [14], [13], [32], [15]) attacks were performed on a different device. This article significantly improves on [21] to present a generalized Deep Learning based cross-device SCA attack on 30 different devices, utilizing DTW and PCA along with the multi-device training.…”
Section: A Related Workmentioning
confidence: 99%
See 1 more Smart Citation