2022
DOI: 10.1145/3517810
|View full text |Cite
|
Sign up to set email alerts
|

A Review and Comparison of AI-enhanced Side Channel Analysis

Abstract: Side Channel Analysis (SCA) presents a clear threat to privacy and security in modern computing systems. The vast majority of communications are secured through cryptographic algorithms. These algorithms are often provably-secure from a cryptographical perspective, but their implementation on real hardware introduces vulnerabilities. Adversaries can exploit these vulnerabilities to conduct SCA and recover confidential information, such as secret keys or internal states. The threat of SCA has greatly increased … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
3
1

Relationship

1
8

Authors

Journals

citations
Cited by 14 publications
(5 citation statements)
references
References 55 publications
0
5
0
Order By: Relevance
“…Panoff et al [6] presented a great deal of their research to study CNNs and other deep learning approaches for side-channel analysis. For the purpose of practicing sidechannel attacks, a variety of network setups and training methodologies were used.…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…Panoff et al [6] presented a great deal of their research to study CNNs and other deep learning approaches for side-channel analysis. For the purpose of practicing sidechannel attacks, a variety of network setups and training methodologies were used.…”
Section: Literature Reviewmentioning
confidence: 99%
“…To address misaligned trace sets, the second method suggested in SCA literature is to do realignment preprocessing before to the assault. It is possible to classify realignment approaches into two groups: one focused on signal processing (see, for example, [5]) and better suited to hardware countermeasures; and another, more probabilistic in nature (see, for example, [6]), designed for detecting fake operations (software countermeasures).…”
Section: Introductionmentioning
confidence: 99%
“…Without the need to preprocess the input, Cagli et al [29] found that an attacker utilizing convolutional neural networks could potentially recover the secret key using side-channel attacks based on deep learning key. The results of deep learning investigations can be compared with one another with the use of open datasets [30]. In order to break public-key cryptosystems [31], researchers have employed deep learning in tandem with block ciphers.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Profiled side-channel analysis has posed a significant threat to embedded devices [12][13][14]. It aims to exploit various physical side-channel leakages such as power consumption or electromagnetic (EM) emanations to reveal confidential information (e.g., secret keys) from victim cryptographic algorithms.…”
Section: Profiled Side-channel Attackmentioning
confidence: 99%