2018
DOI: 10.1007/978-3-319-89641-0_8
|View full text |Cite
|
Sign up to set email alerts
|

SCATTER: A New Dimension in Side-Channel

Abstract: Side-channel techniques have well progressed over the last few years, leading to the creation of a variety of statistical tools for extracting the secrets used in cryptographic algorithms. Such techniques are taking advantage of the side-channel traces collected during the executions of secret computations in the product. Noticeably, the vast majority of side-channel attacks requires the traces have been aligned together beforehand. This prerequisite turns out to be more and more challenging in the practical r… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
4
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
6
2
1

Relationship

1
8

Authors

Journals

citations
Cited by 15 publications
(5 citation statements)
references
References 37 publications
0
4
0
Order By: Relevance
“…Then we propose to investigate two alternative approaches to analyze them efficiently. First, as jitter spreads the information over multiple time-samples, we applied the Scatter technique [TGWC18], which gathers several sources (i.e. X t ) into the same statistical distribution to counteract jitter.…”
Section: Problematic Of Mixture Distributionsmentioning
confidence: 99%
See 1 more Smart Citation
“…Then we propose to investigate two alternative approaches to analyze them efficiently. First, as jitter spreads the information over multiple time-samples, we applied the Scatter technique [TGWC18], which gathers several sources (i.e. X t ) into the same statistical distribution to counteract jitter.…”
Section: Problematic Of Mixture Distributionsmentioning
confidence: 99%
“…Some other techniques demonstrated that they can tackle the alignment problem by removing the time factor, at least partially. This is the case of frequency based analyses [BBB + 16], distribution based analyses [TGWC18] or deep learning techniques using Convolutional Neural Networks [PSB + 18]. They all have their pros and cons, and should certainly all be considered.…”
Section: Introductionmentioning
confidence: 99%
“…Several techniques, such as fake cycles insertion, unstable clocking, or random delays [49], can be employed to induce alignment problems. To counter these, signal processing can be employed in many cases to correct and align traces [50][51][52]. Other countermeasures seek to add noise or employ filtering circuitry [53].…”
Section: A Brief Look At Countermeasuresmentioning
confidence: 99%
“…The implementation of this type of attack simply consists of two main phases: (i) the acquisition of power traces and (ii) a statistical analysis. With regard to the actual statistical analysis, different types of attacks can be distinguished: Simple Power Analysis, Differential Power Analysis [12], Correlation Power Analysis [13], and scatter analysis [14]. Moreover, machine learning-based approaches to data analysis are gaining more and more interest due to their capability of decoding patterns generated by complex systems [15]- [17].…”
Section: Introductionmentioning
confidence: 99%