2011
DOI: 10.1007/s13389-011-0023-x
|View full text |Cite
|
Sign up to set email alerts
|

Machine learning in side-channel analysis: a first study

Abstract: Electronic devices may undergo attacks going beyond traditional cryptanalysis. Side-channel analysis (SCA) is an alternative attack that exploits information leaking from physical implementations of e.g. cryptographic devices to discover cryptographic keys or other secrets. This work comprehensively investigates the application of a machine learning technique in SCA. The considered technique is a powerful kernel-based learning algorithm: the Least Squares Support Vector Machine (LS-SVM). The chosen side-channe… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
118
0
1

Year Published

2015
2015
2021
2021

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 231 publications
(125 citation statements)
references
References 16 publications
1
118
0
1
Order By: Relevance
“…Recent work [8]- [10] investigated machine learning techniques, and in particular Support Vector Machines (SVM), as an alternative to classical template building approaches. SVM are probably the most prominent member of kernel methods.…”
Section: A Previous Workmentioning
confidence: 99%
“…Recent work [8]- [10] investigated machine learning techniques, and in particular Support Vector Machines (SVM), as an alternative to classical template building approaches. SVM are probably the most prominent member of kernel methods.…”
Section: A Previous Workmentioning
confidence: 99%
“…The stochastic approach exploiting Linear Regression (LR) is a frequently considered alternative [22]. More recently, solutions relying on Machine Learning (ML) have also been investigated [2,11,13,12,16,17,19]. These previous works support the claim that ML-based attacks are effective and lead to successful key recoveries.…”
Section: Introductionmentioning
confidence: 96%
“…Hospodar et al [40], [41] analyzed the SVM on a software implementation of a block cipher. Heuser et al [42] 1Typical for smart cards.…”
Section: Related Workmentioning
confidence: 99%
“…In previous works, individual machine learning (ML) approaches are compared mostly with the template attack or the stochastic attack (SA) [40], [41]. ML approaches have not been compared yet.…”
Section: Contributionmentioning
confidence: 99%