2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST) 2015
DOI: 10.1109/hst.2015.7140247
|View full text |Cite
|
Sign up to set email alerts
|

Neural network based attack on a masked implementation of AES

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
52
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 110 publications
(53 citation statements)
references
References 20 publications
1
52
0
Order By: Relevance
“…It has also been shown that first‐order masked AES can be analyzed using an MLP . For instance, Martinasek and others analyzed a masked AES software implementation using an MLP.…”
Section: Deep Learning‐based Side‐channel Analysismentioning
confidence: 99%
“…It has also been shown that first‐order masked AES can be analyzed using an MLP . For instance, Martinasek and others analyzed a masked AES software implementation using an MLP.…”
Section: Deep Learning‐based Side‐channel Analysismentioning
confidence: 99%
“…In the past couple of years, several ML techniques have been investigated, including but not limited to support vector machines (SVM) [16], [17], random forests (RF) [17]. More recently, the signal processing community as well as the hardware security researchers have started exploring the field of Deep Neural Networks (DNNs) [10], [30].…”
Section: Background and Literature Reviewmentioning
confidence: 99%
“…To the best of our knowledge, both data sets consist of traces captured from one single device, which are not suitable for current work. Hence, we collected new traces from 30 different 8-bit AVR microcontrollers running [10], [30], [19], [18], [20], [31] Cross-device Attack Template Attack [14], [13], [32], [15] Neural Networks [21], [22], This Work the AES-128 algorithm using the ChipWhisperer platform [24] (Figure 2). Although 8-bit microcontrollers are becoming less preferred for encryption engines nowadays, recent body of work ( [13], [18], [37], [38], [39]) investigated performance of Profiled SCA attack using datasets gathered from 8-bit microcontrollers.…”
Section: A Related Workmentioning
confidence: 99%
“…We take 50 features for ML techniques since we use large datasets and the number of features is one of two factors (the second one being the number of measurements) comprising the time complexity for ML algorithms. Additionally, 50 features is also taken in the literature as the design choice [12,14]. To select those features, we use Pearson correlation coefficient where we calculate it for the target class variables HW, which consists of categorical values that are interpreted as numerical values [39]:…”
Section: Data Preparation and Parameter Tuningmentioning
confidence: 99%
“…Machine learning (ML) is a term encompassing a number of methods that can be used for tasks like clustering, classification, regression, feature selection, etc [7]. Consequently, SCA community started to experiment with different ML techniques and to evaluate whether they are useful in the SCA context, see e.g., [4,[8][9][10][11][12][13][14][15][16][17]. Although considering different scenarios and often different ML techniques (with some algorithms used in prevailing number of papers like Support Vector Machines and Random Forest), all those papers have in common that they establish numerous scenarios where ML techniques can outperform template attack and are the best choice for profiled SCA.…”
Section: Introductionmentioning
confidence: 99%