2014
DOI: 10.1007/978-3-642-55220-5_26
|View full text |Cite
|
Sign up to set email alerts
|

How to Certify the Leakage of a Chip?

Abstract: Evaluating side-channel attacks and countermeasures requires determining the amount of information leaked by a target device. For this purpose, information extraction procedures published so far essentially combine a "leakage model " with a "distinguisher ". Fair evaluations ideally require exploiting a perfect leakage model (i.e. exactly corresponding to the true leakage distribution) with a Bayesian distinguisher. But since such perfect models are generally unknown, density estimation techniques have to be u… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
52
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
6
1
1

Relationship

2
6

Authors

Journals

citations
Cited by 71 publications
(53 citation statements)
references
References 16 publications
1
52
0
Order By: Relevance
“…Yet, we note that in general, assumption errors can also lead to imperfect models, that are more difficult to deal with (see, e.g. [8]) and are certainly worth further investigations. Besides, and as already mentioned, since we now want to compare TA, SVM and RF, we need to evaluate and compare them with security metrics (since the two latter ones do not output the probabilities required to estimate information theoretic metrics).…”
Section: Imperfect Profilingmentioning
confidence: 95%
See 2 more Smart Citations
“…Yet, we note that in general, assumption errors can also lead to imperfect models, that are more difficult to deal with (see, e.g. [8]) and are certainly worth further investigations. Besides, and as already mentioned, since we now want to compare TA, SVM and RF, we need to evaluate and compare them with security metrics (since the two latter ones do not output the probabilities required to estimate information theoretic metrics).…”
Section: Imperfect Profilingmentioning
confidence: 95%
“…It implies that the parametersθ x,k correspond to mean vectorsμ x,k and covariance matricesΣ x,k . However, we note that any other PDF estimation could be considered by the adversary/evaluator [8]. We will further consider two types of TA: in the Naive Template Attack (NTA), we will indeed estimate one covariance matrix per intermediate value; in the Efficient Template Attack (ETA), we will pool the covariance estimates (assumed to be equal) across all intermediate values, as previously suggested in [5].…”
Section: Template Attacksmentioning
confidence: 99%
See 1 more Smart Citation
“…Second, a fundamental question whenever performing a leakage detection is to determine whether the conclusions were obtained with sufficient confidence. A standard approach for answering this question is to perform cross-validation, which was recently suggested as an important part of leakage certification procedures [7]. Yet, this comes at the cost of additional data and time requirements.…”
Section: Discussion: Recycling Cepaca To Gain Confidencementioning
confidence: 99%
“…These techniques seem very different at first sight because they require different experimental methods and different algorithms. But several works have been proposed to described them in a common framework [13,17,6]. The aim of such frameworks is to provide strong theoretical basis but practical tools to fairly estimate the information leakage of circuits and thus increase the level of trust in such devices.…”
Section: Introductionmentioning
confidence: 99%