Skip to main content

16.12.2023 | Research Article

Keep it unbiased: a comparison between estimation of distribution algorithms and deep learning for human interaction-free side-channel analysis

verfasst von: Unai Rioja, Lejla Batina, Igor Armendariz, Jose Luis Flores

Erschienen in: Journal of Cryptographic Engineering

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Evaluating side-channel analysis (SCA) security is a complex process, involving applying several techniques whose success depends on human engineering. Therefore, it is crucial to avoid a false sense of confidence provided by non-optimal (failing) attacks. Different alternatives have emerged lately trying to mitigate human dependency, among which deep learning (DL) attacks are the most studied today. DL promise to simplify the procedure by e.g. evading the need for point of interest (POI) selection, among other shortcuts. However, including DL in the equation comes at a price, since working with neural networks is not straightforward in this context. Recently, an alternative has appeared with the potential to mitigate this dependence without adding extra complexity: estimation of distribution algorithm-based SCA. From the perspective of avoiding the need for POI selection, in this paper we provide a comparison of the two relevant methods. Our findings are supported by experimental results on various datasets.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Azouaoui, M., Bellizia, D., Buhan, I., Debande, N., Duval, S., Giraud, C., Jaulmes, E., Koeune, F., Oswald, E., Standaert, F.-X., Whitnall, C.: A systematic appraisal of side channel evaluation strategies. IACR Cryptol. ePrint Arch (2020) Azouaoui, M., Bellizia, D., Buhan, I., Debande, N., Duval, S., Giraud, C., Jaulmes, E., Koeune, F., Oswald, E., Standaert, F.-X., Whitnall, C.: A systematic appraisal of side channel evaluation strategies. IACR Cryptol. ePrint Arch (2020)
2.
Zurück zum Zitat Balasch, J., Gierlichs, B., Grosso, V., Reparaz, O., Standaert, F.-X.: On the cost of lazy engineering for masked software implementations, Vol 8968, pp. 64–81. Joye, Marc, Springer (2014) Balasch, J., Gierlichs, B., Grosso, V., Reparaz, O., Standaert, F.-X.: On the cost of lazy engineering for masked software implementations, Vol 8968, pp. 64–81. Joye, Marc, Springer (2014)
3.
Zurück zum Zitat Benadjila, Ryad, Prouff, Emmanuel, Strullu, Rémi., Cagli, Eleonora, Dumas, Cécile.: Deep learning for side-channel analysis and introduction to ASCAD database. J. Cryptogr. Eng. 10, 06 (2020)CrossRef Benadjila, Ryad, Prouff, Emmanuel, Strullu, Rémi., Cagli, Eleonora, Dumas, Cécile.: Deep learning for side-channel analysis and introduction to ASCAD database. J. Cryptogr. Eng. 10, 06 (2020)CrossRef
4.
Zurück zum Zitat Bhasin, S., Chattopadhyay, A., Heuser, A., Jap, D., Picek, S., Shrivastwa, R.R.: Mind the portability: a warriors guide through realistic profiled side-channel analysis. In: NDSS Symposium (2020) Bhasin, S., Chattopadhyay, A., Heuser, A., Jap, D., Picek, S., Shrivastwa, R.R.: Mind the portability: a warriors guide through realistic profiled side-channel analysis. In: NDSS Symposium (2020)
5.
Zurück zum Zitat Bronchain, Olivier, Standaert, François-Xavier.: Breaking masked implementations with many shares on 32-bit software platforms: or when the security order does not matter. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(3), 202–234 (2021)CrossRef Bronchain, Olivier, Standaert, François-Xavier.: Breaking masked implementations with many shares on 32-bit software platforms: or when the security order does not matter. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(3), 202–234 (2021)CrossRef
6.
Zurück zum Zitat Cagli, E., Dumas, C., Prouff, E.: Convolutional neural networks with data augmentation against jitter-based countermeasures. In: Fischer, W., Homma, N. (eds.) CHES 2017, pp. 45–68, Springer (2017) Cagli, E., Dumas, C., Prouff, E.: Convolutional neural networks with data augmentation against jitter-based countermeasures. In: Fischer, W., Homma, N. (eds.) CHES 2017, pp. 45–68, Springer (2017)
7.
Zurück zum Zitat Cao, Pei, Zhang, Chi, Xiangjun, Lu., Dawu, Gu.: Cross-device profiled side-channel attack with unsupervised domain adaptation. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021, 27–56 (2021)CrossRef Cao, Pei, Zhang, Chi, Xiangjun, Lu., Dawu, Gu.: Cross-device profiled side-channel attack with unsupervised domain adaptation. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021, 27–56 (2021)CrossRef
8.
Zurück zum Zitat Carbone, Mathieu, Conin, Vincent, Cornélie, Marie-Angela., Dassance, François, Dufresne, Guillaume, Dumas, Cécile., Prouff, Emmanuel, Venelli, Alexandre: Deep learning to evaluate secure RSA implementations. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2019(2), 132–161 (2019)CrossRef Carbone, Mathieu, Conin, Vincent, Cornélie, Marie-Angela., Dassance, François, Dufresne, Guillaume, Dumas, Cécile., Prouff, Emmanuel, Venelli, Alexandre: Deep learning to evaluate secure RSA implementations. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2019(2), 132–161 (2019)CrossRef
9.
Zurück zum Zitat Chari, S., Rao, J.R., Rohatgi, P.: Template attacks. In: Cryptographic hardware and embedded systems—CHES 2002, pp. 13–28. Springer (2002) Chari, S., Rao, J.R., Rohatgi, P.: Template attacks. In: Cryptographic hardware and embedded systems—CHES 2002, pp. 13–28. Springer (2002)
10.
Zurück zum Zitat Chen, Z., Haider, S., Schaumont, P.: Side-channel leakage in masked circuits caused by higher-order circuit effects. In: Park, J. H., Chen, H.-H., Atiquzzaman, M., Lee, C., Kim, T., Yeo, S.-S. (eds.), Advances in information security and assurance, pp. 327–336, Berlin, Heidelberg (2009) Chen, Z., Haider, S., Schaumont, P.: Side-channel leakage in masked circuits caused by higher-order circuit effects. In: Park, J. H., Chen, H.-H., Atiquzzaman, M., Lee, C., Kim, T., Yeo, S.-S. (eds.), Advances in information security and assurance, pp. 327–336, Berlin, Heidelberg (2009)
11.
Zurück zum Zitat Choudary, M.O., Kuhn, M.G.: Efficient, portable template attacks. IEEE Trans. Inf. Forensics Secur. 13(2), 490–501 (2018)CrossRef Choudary, M.O., Kuhn, M.G.: Efficient, portable template attacks. IEEE Trans. Inf. Forensics Secur. 13(2), 490–501 (2018)CrossRef
12.
Zurück zum Zitat Choudary, O., Kuhn, M.G.: Template attacks on different devices. In: Constructive side-channel analysis and secure design, COSADE, pp. 179–198. Springer (2014) Choudary, O., Kuhn, M.G.: Template attacks on different devices. In: Constructive side-channel analysis and secure design, COSADE, pp. 179–198. Springer (2014)
13.
Zurück zum Zitat Danial, J., Das, D., Golder, A., Ghosh, S., Raychowdhury, A., Sen, S.: EM-X-DL: efficient cross-device deep learning side-channel attack with noisy EM signatures. CoRR. arXiv:2011.06139 (2020) Danial, J., Das, D., Golder, A., Ghosh, S., Raychowdhury, A., Sen, S.: EM-X-DL: efficient cross-device deep learning side-channel attack with noisy EM signatures. CoRR. arXiv:​2011.​06139 (2020)
14.
Zurück zum Zitat Das, D., Golder, A., Danial, J., Ghosh, S.K., Raychowdhury, A., Sen, S.: X-deepsca: Cross-device deep learning side channel attack*. In: 2019 56th ACM/IEEE Design Automation Conference (DAC), pp 1–6 (2019) Das, D., Golder, A., Danial, J., Ghosh, S.K., Raychowdhury, A., Sen, S.: X-deepsca: Cross-device deep learning side channel attack*. In: 2019 56th ACM/IEEE Design Automation Conference (DAC), pp 1–6 (2019)
15.
Zurück zum Zitat Elaabid, Sylvain, Abdelazizand Guilley, M.: Portability of templates. J. Cryptogr. Eng. 2(1), 63–74 (2012)CrossRef Elaabid, Sylvain, Abdelazizand Guilley, M.: Portability of templates. J. Cryptogr. Eng. 2(1), 63–74 (2012)CrossRef
18.
Zurück zum Zitat Gilmore, R., Hanley, N., O’Neill, M.: Neural network based attack on a masked implementation of AES. In: Proceedings of the 2015 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2015, pp. 106–111 (2015) Gilmore, R., Hanley, N., O’Neill, M.: Neural network based attack on a masked implementation of AES. In: Proceedings of the 2015 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2015, pp. 106–111 (2015)
19.
Zurück zum Zitat Gohr, A., Jacob, S., Schindler, W.: CHES 2018 side channel contest CTF–solution of the AES challenges. IACR Cryptol. ePrint Arch (2019) Gohr, A., Jacob, S., Schindler, W.: CHES 2018 side channel contest CTF–solution of the AES challenges. IACR Cryptol. ePrint Arch (2019)
20.
Zurück zum Zitat Golder, Anupam, Das, Debayan, Danial, Josef, Ghosh, Santosh, Sen, Shreyas, Raychowdhury, Arijit: Practical approaches toward deep-learning-based cross-device power side-channel attack. IEEE Trans. Very Large Scale Integr. VLSI Syst. 27(12), 2720–2733 (2019)CrossRef Golder, Anupam, Das, Debayan, Danial, Josef, Ghosh, Santosh, Sen, Shreyas, Raychowdhury, Arijit: Practical approaches toward deep-learning-based cross-device power side-channel attack. IEEE Trans. Very Large Scale Integr. VLSI Syst. 27(12), 2720–2733 (2019)CrossRef
21.
Zurück zum Zitat Kim, Jaehun, Picek, Stjepan, Heuser, Annelie, Bhasin, Shivam, Hanjalic, Alan: Make some noise unleashing the power of convolutional neural networks for profiled side-channel analysis. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2019(3), 148–179 (2019)CrossRef Kim, Jaehun, Picek, Stjepan, Heuser, Annelie, Bhasin, Shivam, Hanjalic, Alan: Make some noise unleashing the power of convolutional neural networks for profiled side-channel analysis. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2019(3), 148–179 (2019)CrossRef
22.
Zurück zum Zitat Kim, Taewon, Kim, Kwonyoup, Kim, Tae Hyun, Ryu, Sangryeol: AES wireless keyboard: Template attack for eavesdropping. In: Black Hat Asia, Singapore (2018) Kim, Taewon, Kim, Kwonyoup, Kim, Tae Hyun, Ryu, Sangryeol: AES wireless keyboard: Template attack for eavesdropping. In: Black Hat Asia, Singapore (2018)
23.
Zurück zum Zitat Lerman, Liran, Poussier, Romain, Markowitch, Olivier, Standaert, François-Xavier.: Template attacks versus machine learning revisited and the curse of dimensionality in side-channel analysis: extended version. J. Cryptogr. Eng. 8, 11 (2018) Lerman, Liran, Poussier, Romain, Markowitch, Olivier, Standaert, François-Xavier.: Template attacks versus machine learning revisited and the curse of dimensionality in side-channel analysis: extended version. J. Cryptogr. Eng. 8, 11 (2018)
24.
Zurück zum Zitat Maghrebi, Houssem: Deep learning based side-channel attack: a new profiling methodology based on multi-label classification. IACR Cryptol. ePrint Arch (2020) Maghrebi, Houssem: Deep learning based side-channel attack: a new profiling methodology based on multi-label classification. IACR Cryptol. ePrint Arch (2020)
25.
Zurück zum Zitat Maghrebi, H., Portigliatti, T., Prouff, E.: Breaking cryptographic implementations using deep learning techniques. In: SPACE 2016 (2016) Maghrebi, H., Portigliatti, T., Prouff, E.: Breaking cryptographic implementations using deep learning techniques. In: SPACE 2016 (2016)
26.
Zurück zum Zitat Mangard, S., Popp, T., Gammel, B.M.: Side-channel leakage of masked CMOS gates. In: Menezes, A. (ed.), Topics in Cryptology—CT-RSA 2005, pp. 351–365, Springer, Berlin (2005) Mangard, S., Popp, T., Gammel, B.M.: Side-channel leakage of masked CMOS gates. In: Menezes, A. (ed.), Topics in Cryptology—CT-RSA 2005, pp. 351–365, Springer, Berlin (2005)
27.
Zurück zum Zitat Martinasek, Z., Malina, L.: Comparison of profiling power analysis attacks using templates and multi-layer perceptron network (2014) Martinasek, Z., Malina, L.: Comparison of profiling power analysis attacks using templates and multi-layer perceptron network (2014)
28.
Zurück zum Zitat Oswald, E., Mangard, S.: Template attacks on masking-resistance is futile. In: CT-RSA 2007: Topics in Cryptology, vol. 4377, pp. 243–256 (2007) Oswald, E., Mangard, S.: Template attacks on masking-resistance is futile. In: CT-RSA 2007: Topics in Cryptology, vol. 4377, pp. 243–256 (2007)
29.
Zurück zum Zitat Paguada, Servio, Batina, Lejla, Armendariz, Igor: Toward practical autoencoder-based side-channel analysis evaluations. Comput. Netw. 196, 108230 (2021)CrossRef Paguada, Servio, Batina, Lejla, Armendariz, Igor: Toward practical autoencoder-based side-channel analysis evaluations. Comput. Netw. 196, 108230 (2021)CrossRef
30.
Zurück zum Zitat Paguada, S., Rioja, U., Armendariz, I.: Controlling the deep learning-based side-channel analysis: a way to leverage from heuristics. In: ACNS Workshops (2020) Paguada, S., Rioja, U., Armendariz, I.: Controlling the deep learning-based side-channel analysis: a way to leverage from heuristics. In: ACNS Workshops (2020)
31.
Zurück zum Zitat Perin, Guilherme, Chmielewski, Lukasz, Picek, Stjepan: Strength in numbers: improving generalization with ensembles in machine learning-based profiled side-channel analysis. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(4), 337–364 (2020)CrossRef Perin, Guilherme, Chmielewski, Lukasz, Picek, Stjepan: Strength in numbers: improving generalization with ensembles in machine learning-based profiled side-channel analysis. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(4), 337–364 (2020)CrossRef
32.
Zurück zum Zitat Perin, G., Ege, B.: Lowering the bar: deep learning for side-channel analysis (whitepaper ). In: Proc. BlackHat, pp. 1–15 (2018) Perin, G., Ege, B.: Lowering the bar: deep learning for side-channel analysis (whitepaper ). In: Proc. BlackHat, pp. 1–15 (2018)
33.
Zurück zum Zitat Perin, Guilherme, Lichao, Wu., Picek, Stjepan: Exploring feature selection scenarios for deep learning-based side-channel analysis. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(4), 828–861 (2022)CrossRef Perin, Guilherme, Lichao, Wu., Picek, Stjepan: Exploring feature selection scenarios for deep learning-based side-channel analysis. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(4), 828–861 (2022)CrossRef
34.
Zurück zum Zitat Picek, S., Heuser, A., Jovic, A., Batina, L.: A systematic evaluation of profiling through focused feature selection. IEEE Trans. Very Large Scale Integr. (VLSI) Syst., pp. 1–14 (2019) Picek, S., Heuser, A., Jovic, A., Batina, L.: A systematic evaluation of profiling through focused feature selection. IEEE Trans. Very Large Scale Integr. (VLSI) Syst., pp. 1–14 (2019)
35.
Zurück zum Zitat Picek, S., Samiotis, I. P., Kim, J., Heuser, A., Bhasin, S., Legay, A.: On the performance of convolutional neural networks for side-channel analysis. In: Chattopadhyay, A., Rebeiro, C., Yarom, Y. (eds.) Security, Privacy, and Applied Cryptography Engineering, pp. 157–176, Springer, Cham (2018) Picek, S., Samiotis, I. P., Kim, J., Heuser, A., Bhasin, S., Legay, A.: On the performance of convolutional neural networks for side-channel analysis. In: Chattopadhyay, A., Rebeiro, C., Yarom, Y. (eds.) Security, Privacy, and Applied Cryptography Engineering, pp. 157–176, Springer, Cham (2018)
36.
Zurück zum Zitat Rechberger, C., Oswald, E.: Practical template attacks. In: Lim, C. H., Yung, M. (eds.) Information Security Applications, pp. 440–456, Springer, Berlin (2005) Rechberger, C., Oswald, E.: Practical template attacks. In: Lim, C. H., Yung, M. (eds.) Information Security Applications, pp. 440–456, Springer, Berlin (2005)
37.
Zurück zum Zitat Renauld, M., Standaert, F.-X., Veyrat-Charvillon, N., Kamel, D., Flandre, D.: A formal study of power variability issues and side-channel attacks for nanoscale devices. In: Advances in Cryptology—EUROCRYPT 2011, pp. 109–128. Springer, Heidelberg (2011) Renauld, M., Standaert, F.-X., Veyrat-Charvillon, N., Kamel, D., Flandre, D.: A formal study of power variability issues and side-channel attacks for nanoscale devices. In: Advances in Cryptology—EUROCRYPT 2011, pp. 109–128. Springer, Heidelberg (2011)
38.
Zurück zum Zitat Rijsdijk, Jorai, Lichao, Wu., Perin, Guilherme, Picek, Stjepan: Reinforcement learning for hyperparameter tuning in deep learning-based side-channel analysis. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(3), 677–707 (2021)CrossRef Rijsdijk, Jorai, Lichao, Wu., Perin, Guilherme, Picek, Stjepan: Reinforcement learning for hyperparameter tuning in deep learning-based side-channel analysis. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(3), 677–707 (2021)CrossRef
39.
Zurück zum Zitat Rioja, U., Batina, L., Armendariz, I., Flores, J.L.: Towards human dependency elimination: AI approach to SCA robustness assessment. IEEE Trans. Inf. Forensics Secur. (2022) Rioja, U., Batina, L., Armendariz, I., Flores, J.L.: Towards human dependency elimination: AI approach to SCA robustness assessment. IEEE Trans. Inf. Forensics Secur. (2022)
40.
Zurück zum Zitat Rioja, Unai, Batina, Lejla, Flores, Jose Luis, Armendariz, Igor: Auto-tune pois: estimation of distribution algorithms for efficient side-channel analysis. Comput. Netw. 198, 108405 (2021)CrossRef Rioja, Unai, Batina, Lejla, Flores, Jose Luis, Armendariz, Igor: Auto-tune pois: estimation of distribution algorithms for efficient side-channel analysis. Comput. Netw. 198, 108405 (2021)CrossRef
41.
Zurück zum Zitat Shelton, M., Samwel, N., Batina, L., Regazzoni, F., Wagner, M., Yarom, Y.: Rosita: towards automatic elimination of power-analysis leakage in ciphers. In: NDSS Symposium (2021) Shelton, M., Samwel, N., Batina, L., Regazzoni, F., Wagner, M., Yarom, Y.: Rosita: towards automatic elimination of power-analysis leakage in ciphers. In: NDSS Symposium (2021)
42.
Zurück zum Zitat Standaert, F.-X., Archambeau, C.: Using subspace-based template attacks to compare and combine power and electromagnetic information leakages. In: Oswald, E., Rohatgi, P. (eds.) Cryptographic Hardw Embed Syst—CHES 2008, pp. 411–425. Springer, Heidelberg (2008) Standaert, F.-X., Archambeau, C.: Using subspace-based template attacks to compare and combine power and electromagnetic information leakages. In: Oswald, E., Rohatgi, P. (eds.) Cryptographic Hardw Embed Syst—CHES 2008, pp. 411–425. Springer, Heidelberg (2008)
43.
Zurück zum Zitat Thapar, D., Alam, M., Mukhopadhyay, D.: Deep learning assisted cross-family profiled side-channel attacks using transfer learning. In: 2021 22nd International Symposium on Quality Electronic Design (ISQED), pp. 178–185 (2021) Thapar, D., Alam, M., Mukhopadhyay, D.: Deep learning assisted cross-family profiled side-channel attacks using transfer learning. In: 2021 22nd International Symposium on Quality Electronic Design (ISQED), pp. 178–185 (2021)
44.
Zurück zum Zitat Wouters, Lennert, Arribas, Victor, Gierlichs, Benedikt, Preneel, Bart: Revisiting a methodology for efficient CNN architectures in profiling attacks. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(3), 147–168 (2020)CrossRef Wouters, Lennert, Arribas, Victor, Gierlichs, Benedikt, Preneel, Bart: Revisiting a methodology for efficient CNN architectures in profiling attacks. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(3), 147–168 (2020)CrossRef
45.
Zurück zum Zitat Wu, L., Perin, G., Picek, S.: I choose you: automated hyperparameter tuning for deep learning-based side-channel analysis. IACR Cryptol. ePrint Arch., p. 1293 (2020) Wu, L., Perin, G., Picek, S.: I choose you: automated hyperparameter tuning for deep learning-based side-channel analysis. IACR Cryptol. ePrint Arch., p. 1293 (2020)
46.
Zurück zum Zitat Yang, S., Zhou, Y., Liu, J., Chen, D.: Back propagation neural network based leakage characterization for practical security analysis of cryptographic implementations, pp. 169–185 (2011) Yang, S., Zhou, Y., Liu, J., Chen, D.: Back propagation neural network based leakage characterization for practical security analysis of cryptographic implementations, pp. 169–185 (2011)
47.
Zurück zum Zitat Yu, H., Shan, H., Panoff, M., Jin, Y.: Cross-device profiled side-channel attacks using meta-transfer learning. In: 2021 58th ACM/IEEE Design Automation Conference (DAC), pp. 703–708 (2021) Yu, H., Shan, H., Panoff, M., Jin, Y.: Cross-device profiled side-channel attacks using meta-transfer learning. In: 2021 58th ACM/IEEE Design Automation Conference (DAC), pp. 703–708 (2021)
48.
Zurück zum Zitat Zaid, G., Bossuet, L., Habrard, A., Venelli, A.: Methodology for efficient CNN architectures in profiling attacks. IACR Trans. Cryptogr. Hardw. Embed. Syst., Vol. 2020 (2019) Zaid, G., Bossuet, L., Habrard, A., Venelli, A.: Methodology for efficient CNN architectures in profiling attacks. IACR Trans. Cryptogr. Hardw. Embed. Syst., Vol. 2020 (2019)
49.
Zurück zum Zitat Zhou, Yuanyuan, Standaert, François-Xavier.: Deep learning mitigates but does not annihilate the need of aligned traces and a generalized ResNet model for side-channel attacks. J. Cryptogr. Eng. 10, 04 (2020)CrossRef Zhou, Yuanyuan, Standaert, François-Xavier.: Deep learning mitigates but does not annihilate the need of aligned traces and a generalized ResNet model for side-channel attacks. J. Cryptogr. Eng. 10, 04 (2020)CrossRef
50.
Zurück zum Zitat Zotkin, Y., Olivier, F., Bourbao, E.: Deep learning vs template attacks in front of fundamental targets: experimental study. IACR Cryptol. ePrint Arch., pp. 1213 (2018) Zotkin, Y., Olivier, F., Bourbao, E.: Deep learning vs template attacks in front of fundamental targets: experimental study. IACR Cryptol. ePrint Arch., pp. 1213 (2018)
Metadaten
Titel
Keep it unbiased: a comparison between estimation of distribution algorithms and deep learning for human interaction-free side-channel analysis
verfasst von
Unai Rioja
Lejla Batina
Igor Armendariz
Jose Luis Flores
Publikationsdatum
16.12.2023
Verlag
Springer Berlin Heidelberg
Erschienen in
Journal of Cryptographic Engineering
Print ISSN: 2190-8508
Elektronische ISSN: 2190-8516
DOI
https://doi.org/10.1007/s13389-023-00342-0

Premium Partner