Proceedings 2020 Network and Distributed System Security Symposium 2020
DOI: 10.14722/ndss.2020.24390
|View full text |Cite
|
Sign up to set email alerts
|

Mind the Portability: A Warriors Guide through Realistic Profiled Side-channel Analysis

Abstract: Profiled side-channel attacks represent a practical threat to digital devices, thereby having the potential to disrupt the foundation of e-commerce, the Internet of Things (IoT), and smart cities. In the profiled side-channel attack, the adversary gains knowledge about the target device by getting access to a cloned device. Though these two devices are different in realworld scenarios, yet, unfortunately, a large part of research works simplifies the setting by using only a single device for both profiling and… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
35
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
5
1

Relationship

3
3

Authors

Journals

citations
Cited by 48 publications
(40 citation statements)
references
References 24 publications
1
35
0
Order By: Relevance
“…Figure 5 shows the result (only two key bytes are shown for brevity) for attack in self and cross device setting. Indeed, there is degradation of 30-60% degradation in number of traces required, however this is much better than 2000% degradation reported for other devices [13]. 60% degradation correspond to few extra minutes of measurement time, making cross-device a serious threat to such hardware engines.…”
Section: Key Recovery Attack On Aes-256 With Device Intrinsic Keymentioning
confidence: 86%
See 2 more Smart Citations
“…Figure 5 shows the result (only two key bytes are shown for brevity) for attack in self and cross device setting. Indeed, there is degradation of 30-60% degradation in number of traces required, however this is much better than 2000% degradation reported for other devices [13]. 60% degradation correspond to few extra minutes of measurement time, making cross-device a serious threat to such hardware engines.…”
Section: Key Recovery Attack On Aes-256 With Device Intrinsic Keymentioning
confidence: 86%
“…only a few traces from victim device and leakage profile from the clone device, performs a key recovery attack on victim device. The use of deep neural networks (DNN) have made cross-device attacks effective [13], [14]. DNN are trained with SCA measurements from clone device with known leakage labels, while trained model is queried with unlabeled SCA traces from victim device.…”
Section: Key Recovery Attack On Aes-256 With Device Intrinsic Keymentioning
confidence: 99%
See 1 more Smart Citation
“…The work of Choudary and Kuhn focuses on differences between devices when performing portable template attacks (considering mainly DC offset caused by temperature changes) [7]. Bhasin et al recently compared different machine learning techniques on the efficacy with respect to portability [3]. A common point in all those works is they identified the problem and try to amortize the penalty due to portability.…”
Section: Related Workmentioning
confidence: 99%
“…However, profiling traces obtained from a device different than the target device are not necessarily accurate due to variations between individual chips. This is the so-called issue of portability that has received wide coverage in many papers the last few years [3,6]. For dedicated security products such as smart cards it is often even infeasible to obtain an open device similar to the target device and profiling is simply out of the question.…”
Section: Introductionmentioning
confidence: 99%