2012
DOI: 10.1007/978-3-642-29912-4_18
|View full text |Cite
|
Sign up to set email alerts
|

Intelligent Machine Homicide

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
43
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
4
3
1

Relationship

2
6

Authors

Journals

citations
Cited by 115 publications
(44 citation statements)
references
References 11 publications
0
43
0
Order By: Relevance
“…In all cases template attack either matched or outperformed LS-SVM. Better results were achieved in Heuser and Zohner (2012), where the HW was classified successfully with SVM, requiring fewer attack traces with moderate to high noise.…”
Section: Introductionmentioning
confidence: 88%
“…In all cases template attack either matched or outperformed LS-SVM. Better results were achieved in Heuser and Zohner (2012), where the HW was classified successfully with SVM, requiring fewer attack traces with moderate to high noise.…”
Section: Introductionmentioning
confidence: 88%
“…Recent work [8]- [10] investigated machine learning techniques, and in particular Support Vector Machines (SVM), as an alternative to classical template building approaches. SVM are probably the most prominent member of kernel methods.…”
Section: A Previous Workmentioning
confidence: 99%
“…While classical templates aim at building an explicit characterisation of data, SVM aim at separating data into classes, but clearly noise will negatively impact the performance of both techniques; other intuitive parameters are the number of available traces, and the number of relevant points as described above. When the noise is higher, SVM outperform classical approaches, and require slightly fewer traces to succeed [10].…”
Section: A Previous Workmentioning
confidence: 99%
“…They first compared TA and learning algorithms, namely Random Forest (RF), SVM, and Self-Organizing Maps (SOM), and then proposed an enhanced brute force algorithm to break the key. Heuser et al [25] analyzed multiple bits of the key based on the Hamming weight model by using multi-class SVM. The authors divided the intermediate power consumption into several classes and then calculated the probability of belonging to each class.…”
Section: Introductionmentioning
confidence: 99%
“…The previous work [23][24][25][26][27] focused more on how SVM translates a problem of breaking the key into the classification of machine learning. There is no systematic literature to study the elements that influence the performance of SVM in power analysis attacks.…”
Section: Introductionmentioning
confidence: 99%