2020 IEEE Asia Pacific Conference on Circuits and Systems (APCCAS) 2020
DOI: 10.1109/apccas50809.2020.9301673
|View full text |Cite
|
Sign up to set email alerts
|

Performance Analysis of Non-Profiled Side Channel Attacks Based on Convolutional Neural Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
4
1
1

Relationship

2
4

Authors

Journals

citations
Cited by 8 publications
(9 citation statements)
references
References 6 publications
0
8
0
Order By: Relevance
“…In addition, one drawback of DDLA is that it is necessary to perform a DL training for each key guess (i.e., 256 training times in the case of AES-128) [6], the higher the data dimension, the more complex the network architecture. Therefore, high dimension data is a serious problem for DDLA, which motivated us to extend the previous work [7] for a comprehensive analysis to assess the efficiency of DDLA techniques in a more complicated context. It is expected that a new DL architecture combining with the HW labelling technique can tackle the high dimension data issue.…”
Section: Motivationmentioning
confidence: 99%
See 2 more Smart Citations
“…In addition, one drawback of DDLA is that it is necessary to perform a DL training for each key guess (i.e., 256 training times in the case of AES-128) [6], the higher the data dimension, the more complex the network architecture. Therefore, high dimension data is a serious problem for DDLA, which motivated us to extend the previous work [7] for a comprehensive analysis to assess the efficiency of DDLA techniques in a more complicated context. It is expected that a new DL architecture combining with the HW labelling technique can tackle the high dimension data issue.…”
Section: Motivationmentioning
confidence: 99%
“…In the DL-based SCA context, the popular activation functions used in hidden layers are ELU and RELU, which are computed as formula ( 6) and (7), respectively. Our proposed model used ELU instead of ReLU to avoid the vanishing problem and produce negative outputs for each node in the hidden layer.…”
Section: Multilayer Perceptronmentioning
confidence: 99%
See 1 more Smart Citation
“…Since the changes of the IC design will also lead to corresponding changes in the physical parameters, SCA techniques can detect many types of HTs with different sizes and structures. Moreover, recently, the research on the application of different artificial intelligence (AI) techniques including ML and deep learning (DL) in hardware security has also shown promising results [6][7]. Hence, in this work, we aim to propose a new HT detection technique with power traces and ML.…”
Section: Existing Techniques For Hardware Trojan Detectionmentioning
confidence: 99%
“…One of them is the state-ofthe-art non-profiled based technique called differential deep learning analysis (DDLA). However, we have already shown that it is sensitive with the additional Gaussian noise [23]. Despite attacking successfully the masking countermeasure, this technique is less effective than the conventional secondorder DPA which can overcome the hiding countermeasure by using a large enough number of power traces.…”
Section: Introductionmentioning
confidence: 98%