2014
DOI: 10.1504/ijact.2014.062722
|View full text |Cite
|
Sign up to set email alerts
|

Power analysis attack: an approach based on machine learning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
84
0
1

Year Published

2015
2015
2021
2021

Publication Types

Select...
5
4

Relationship

2
7

Authors

Journals

citations
Cited by 113 publications
(86 citation statements)
references
References 32 publications
1
84
0
1
Order By: Relevance
“…The stochastic approach exploiting Linear Regression (LR) is a frequently considered alternative [22]. More recently, solutions relying on Machine Learning (ML) have also been investigated [2,11,13,12,16,17,19]. These previous works support the claim that ML-based attacks are effective and lead to successful key recoveries.…”
Section: Introductionmentioning
confidence: 97%
“…The stochastic approach exploiting Linear Regression (LR) is a frequently considered alternative [22]. More recently, solutions relying on Machine Learning (ML) have also been investigated [2,11,13,12,16,17,19]. These previous works support the claim that ML-based attacks are effective and lead to successful key recoveries.…”
Section: Introductionmentioning
confidence: 97%
“…Yang et al [37] proposed MLP in order to create a power consumption model of a cryptographic device in CPA. Lerman et al [38], [39] compared a template attack with a binary machine learning approach, based on non-parametric methods.…”
Section: Related Workmentioning
confidence: 99%
“…putIntoCluster(trace, clusters, manipInst) 7: end for 8: HW = prediction(attacked trace, clusters, manipInst) 9: byteV alue = recoverKey(HW ) {enumeration by brute force} Lerman et al [11] and Hospodar et al [8] discussed the role of machine learning in TA. They showed that a machine learning procedure is able to outperform conventional TA.…”
Section: Algorithm 1 Ssta Algorithm: Pseudo-codementioning
confidence: 99%