Security of Ubiquitous Computing Systems 2021
DOI: 10.1007/978-3-030-10591-4_8
|View full text |Cite
|
Sign up to set email alerts
|

It Started with Templates: The Future of Profiling in Side-Channel Analysis

Abstract: Side-channel attacks (SCAs) are powerful attacks based on the information obtained from the implementation of cryptographic devices. Profiling side-channel attacks has received a lot of attention in recent years due to the fact that this type of attack defines the worst-case security assumptions. The SCA community realized that the same approach is actually used in other domains in the form of supervised machine learning. Consequently, some researchers started experimenting with different machine learning tech… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 42 publications
0
5
0
Order By: Relevance
“…Non-invasive attacks necessitate the attacker being proximate enough to target the chip and electrical properties in IoT device, allowing the attackers to alter device behaviour or obtain sensitive data. For instance, an attacker can analyse the power signature or electromagnetic radiation emitted by an IC to obtain sensitive data (Batina et al , 2021). …”
Section: Potential Risks Of Integrating Internet Of Things In E-gover...mentioning
confidence: 99%
“…Non-invasive attacks necessitate the attacker being proximate enough to target the chip and electrical properties in IoT device, allowing the attackers to alter device behaviour or obtain sensitive data. For instance, an attacker can analyse the power signature or electromagnetic radiation emitted by an IC to obtain sensitive data (Batina et al , 2021). …”
Section: Potential Risks Of Integrating Internet Of Things In E-gover...mentioning
confidence: 99%
“…Template attack: Template attacks determine secret information through precise multivariate characterization of signals and noise of a target system by using detailed profiles of signals and noise of identical experimental systems [22]. Template attacks are the strongest form of SCAs possible in an information theoretic sense because they utilize all possible information (both signal and noise) available in each sample of leaked information.…”
Section: Sca Vulnerability Of Ecc Scalar Multiplication and Existing Countermeasuresmentioning
confidence: 99%
“…Based on this hypothesis, The main challenge of SCA with semi-supervised learning is how to use very few labeled power traces to improve the possibility of recovering keys. Some researchers have employed techniques such as self-training and graph-based learning to address this challenge [15][16][17]. Biao Liu et al proposed an attack algorithm based on collaborative learning.…”
Section: Introductionmentioning
confidence: 99%