2016 18th Conference of Open Innovations Association and Seminar on Information Security and Protection of Information Technolo 2016
DOI: 10.1109/fruct-ispit.2016.7561525
|View full text |Cite
|
Sign up to set email alerts
|

Side-channel attacks and machine learning approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(6 citation statements)
references
References 14 publications
0
6
0
Order By: Relevance
“…Acoustic side-channel attacks eavesdrop on sound artifacts produced by a system using covert listening devices (Levina, Sleptsova and Zaitsev, 2016). Acoustic signals may be generated through user operation, such as clicks resulting from keypad inputs.…”
Section: Side-channel Attacksmentioning
confidence: 99%
“…Acoustic side-channel attacks eavesdrop on sound artifacts produced by a system using covert listening devices (Levina, Sleptsova and Zaitsev, 2016). Acoustic signals may be generated through user operation, such as clicks resulting from keypad inputs.…”
Section: Side-channel Attacksmentioning
confidence: 99%
“…In Reference 36, Prouff et al have used ML‐SCA to recover the secret key by using the hamming weight strategy for class labeling. In Reference 37, Levina et al have discussed the applicability of the machine‐learning methods for secret key classification tasks, based on the bitwise and byte‐wise analysis. Furthermore, Cagli et al and Kim et al have presented early studies which show that deep learning outperforms the traditional side‐channel analysis methods, since they have the capability of learning from the misaligned countermeasure protected data as well 17,20 .…”
Section: Background and Related Workmentioning
confidence: 99%
“…As the side‐channel attacks exploit the relationship dependency of the leakage data with the processed secret data/key, hence, the same leakage trace might represent a single key bit, a key nibble, a key byte, or a particular algorithm operation (e.g., addition or doubling). The resulting design model leads to binary or multiclass classification problems, as has been presented in literature 35‐37 . The hamming weight‐based class labeling model is the most popular model for analyzing cryptographic algorithms.…”
Section: Deep‐learning Based Side‐channel Analysis Systemmentioning
confidence: 99%
See 1 more Smart Citation
“…Recently, researchers have performed machine-learning and neural-network-based analysis to improve side-channel attack efficiency, using various classifiers, to recover the key from the DES, AES and RSA hardware implementations [19][20][21][22][23]. Some of the major challenges of machine learning are over-fitting and the curse of dimensionality, in which a model trains itself to the specific data so well that it fails to predict accurately with new unseen data.…”
Section: Introductionmentioning
confidence: 99%