2013
DOI: 10.1007/978-3-642-40026-1_12
|View full text |Cite
|
Sign up to set email alerts
|

Semi-Supervised Template Attack

Abstract: Abstract. Side channel attacks take advantage of the information leakage in a cryptographic device. A template attack is a family of side channel attacks which is reputed to be extremely effective. This kind of attacks supposes that the attacker can fully control a cryptographic device before attacking a similar one. In this paper, we propose a method based on a semi-supervised learning strategy to relax this assumption. The effectiveness of our proposal is confirmed by software simulations as well as by exper… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 26 publications
(10 citation statements)
references
References 19 publications
0
10
0
Order By: Relevance
“…In [49], this MLP approach was optimized by using the preprocessing of the power traces measured. Lerman et al [50] introduced semisupervised a Template Attack, that combines supervised and unsupervised learning. The method was confirmed by the experiments on an 8-bit microcontroller and by a comparison to a template attack.…”
Section: Related Workmentioning
confidence: 99%
“…In [49], this MLP approach was optimized by using the preprocessing of the power traces measured. Lerman et al [50] introduced semisupervised a Template Attack, that combines supervised and unsupervised learning. The method was confirmed by the experiments on an 8-bit microcontroller and by a comparison to a template attack.…”
Section: Related Workmentioning
confidence: 99%
“…For example, in [10] a non-profiling attack was first used to recover a key prior to subsequently using the broken device to build templates. In [20], it was shown how a device with a faulty random number generator (RNG) suffices to build templates, while in [21] it was shown how two devices with different unknown keys could be used. It was also suggested in [22] that public verification functions could be used to build templates using the device under attack itself.…”
Section: Profiling Attacksmentioning
confidence: 99%
“…To the best of our knowledge, the only work up till now implementing a semisupervised analysis in SCA is [10], where the authors conclude that the semisupervised setting cannot compete with a supervised setting. Unfortunately, the assumed scenario is hard to justify and consequently their results are expected (but without much implication for SCA).…”
Section: Introductionmentioning
confidence: 97%