2014
DOI: 10.1007/s13389-014-0075-9
|View full text |Cite
|
Sign up to set email alerts
|

Practical improvements of side-channel attacks on AES: feedback from the 2nd DPA contest

Abstract: Side-channel analyses constitute a major threat for embedded devices, because they allow an attacker to recover secret keys without the device being aware of the sensitive information theft. They have been proved to be efficient in practice on many deployed cryptosystems. Even during the standardization process for the AES, many scientists have raised the attention on the potential vulnerabilities against implementation-level attacks Chari et al. (A Cautionary Note Regarding Evaluation of AES Candidates on Sma… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
6
1
1

Relationship

3
5

Authors

Journals

citations
Cited by 30 publications
(16 citation statements)
references
References 16 publications
0
16
0
Order By: Relevance
“…Therefore, when the number of executions/ measurements per unknown binary is not a restricting factor for the malware analyst, then computing the mean over 𝑡 traces will result in a more accurate prediction. This meaning process is usually in the side-channel domain, as in [8]. Interestingly, we could not observe a straightforward improvement when applying this technique to MLP and CNN classifications.…”
Section: Discussionmentioning
confidence: 81%
“…Therefore, when the number of executions/ measurements per unknown binary is not a restricting factor for the malware analyst, then computing the mean over 𝑡 traces will result in a more accurate prediction. This meaning process is usually in the side-channel domain, as in [8]. Interestingly, we could not observe a straightforward improvement when applying this technique to MLP and CNN classifications.…”
Section: Discussionmentioning
confidence: 81%
“…As illustrated in Appendix A, Figure 6, the data complexity of an attack using PCA is approximately doubled in this case, which can be explained by the correlation between the noise distributions taken at different time samples. Note that this projection pursuit was included amongst the best attacks of this contest, leading to a data complexity of 1173 traces (439 after key enumeration) as detailed in [7].…”
Section: Resultsmentioning
confidence: 99%
“…As a profiling model, we used the XOR model that was proposed in [5]. In [5], the advantage of the XOR model in correctly profiling the leakage of AES-comp implementation was shown. The XOR model leads to successful key recovery with reduced power traces compared to the HD model.…”
Section: Profiling Model: Xor Modelmentioning
confidence: 99%
“…Generally speaking, one can expect side-channel attacks to have a reduced data complexity with a more accurate leakage model. Specifically, we use a Hamming distance (HD) model as the non-profiling leakage model and the XOR (exclusive-or) model proposed in [5] as the representative of the profiling leakage model. It is expected that the profiling model will improve the authentication accuracy of the system.…”
Section: Introductionmentioning
confidence: 99%