2019 ACM/IEEE International Workshop on System Level Interconnect Prediction (SLIP) 2019
DOI: 10.1109/slip.2019.8771328
|View full text |Cite
|
Sign up to set email alerts
|

Security Network On-Chip for Mitigating Side-Channel Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(5 citation statements)
references
References 12 publications
0
5
0
Order By: Relevance
“…Within the scope of this study, the impacts of hyper-parameters on DLSCA's efficiency have not been thoroughly investigated. This is because Proof et al [20] address VGG hyper-parameter selection in great detail. This is the primary explanation for this.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Within the scope of this study, the impacts of hyper-parameters on DLSCA's efficiency have not been thoroughly investigated. This is because Proof et al [20] address VGG hyper-parameter selection in great detail. This is the primary explanation for this.…”
Section: Resultsmentioning
confidence: 99%
“…Furthermore, the DDLA attack is fully capable of extracting the secret key of the disguised AES implementation when the epoch value is 10 or higher. This is particularly true when the epoch value is larger than 10 [20].…”
Section: Review Of Workmentioning
confidence: 95%
“…Several significant achievements in HT detection have been demonstrated with machine learning (ML) approaches. Based on an extensive literature review in the recent survey on ML against HT attacks [7], several ML-based HT detection methods focus on sidechannel analysis because large volumes of side-channel data can be produced and utilized for training [8], [9]. However, these methods require a golden HT-free model to compare the reference side-channel data with the information obtained from the chip under investigation.…”
Section: Review Of Existing Ht Early Detection Methodsmentioning
confidence: 99%
“…Finally, tagged data is sampled (7) into a perception field feature array using the embeddings and graph information. The perception field of each embedding is then classified ( 8) with a supervised model, and the per-embedding predictions are aggregated (9) according to the preferred detection policy. Using a zero-tolerance detection policy, the overall IC is labeled as compromised if an HT embedding is detected.…”
Section: Proposed Frameworkmentioning
confidence: 99%
“…Despite the fact that the number of devices is growing, this is also producing security problems and vulnerabilities, which is boosting the need for solutions that have been certified. As a consequence of this, millions of things are put through rigorous security examinations on a daily basis in evaluation labs located all over the world [2]. Since the 1990s, field study in cryptography and information security have conducted substantial study on side-channel attacks (SCA), also known as analyses.…”
Section: Introductionmentioning
confidence: 99%