2017
DOI: 10.1007/978-3-319-66787-4_3
|View full text |Cite
|
Sign up to set email alerts
|

Convolutional Neural Networks with Data Augmentation Against Jitter-Based Countermeasures

Abstract: In the context of the security evaluation of cryptographic implementations, profiling attacks (aka Template Attacks) play a fundamental role. Nowadays the most popular Template Attack strategy consists in approximating the information leakages by Gaussian distributions. Nevertheless this approach suffers from the difficulty to deal with both the traces misalignment and the high dimensionality of the data. This forces the attacker to perform critical preprocessing phases, such as the selection of the points of … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
273
0
1

Year Published

2018
2018
2021
2021

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 292 publications
(275 citation statements)
references
References 26 publications
1
273
0
1
Order By: Relevance
“…As mentioned earlier, Maghrebi and others applied the CNN architecture to SCA . Cagli and others then proposed a CNN‐based SCA on a protected AES with jitter‐based hiding methods . They were the first to show that a CNN could be used to neutralize jitter‐based hiding countermeasures without any other pre‐processing.…”
Section: Deep Learning‐based Side‐channel Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…As mentioned earlier, Maghrebi and others applied the CNN architecture to SCA . Cagli and others then proposed a CNN‐based SCA on a protected AES with jitter‐based hiding methods . They were the first to show that a CNN could be used to neutralize jitter‐based hiding countermeasures without any other pre‐processing.…”
Section: Deep Learning‐based Side‐channel Analysismentioning
confidence: 99%
“…They were the first to show that a CNN could be used to neutralize jitter‐based hiding countermeasures without any other pre‐processing. In , through experimentation with learning the Sbox output of AES protected by random delay insertion and clock jitter, the robustness of a CNN to data distortions was demonstrated. Although CNN has fewer weights to train than MLP, it requires ample learning data to learn the general invariant features of the traces from a device protected by a hiding method.…”
Section: Deep Learning‐based Side‐channel Analysismentioning
confidence: 99%
“…One major direction is to the learning-aided side channel attacks. [8], [19]- [21]. Researchers apply learning approaches to replace the traditional statistical profiling phase in side-channel attacks.…”
Section: B Neural Network In Cryptanalysismentioning
confidence: 99%
“…Chose ( +1)mod8 (19) go to Line (8) (20) end if (21) end if there was one obvious peak in original DPA of DES algorithm for each Sbox. On the contrary, several peaks in our scheme with 5000 traces we found in Figure 5 were "ghost" peaks, which leads to wrong key corresponding to the target Sbox.…”
Section: Inputmentioning
confidence: 99%