How to fool a black box machine learning based side-channel security evaluation
DOI10.1007/S12095-021-00479-XzbMATH Open1490.68192OpenAlexW3159706829MaRDI QIDQ2120993FDOQ2120993
Authors: Charles-Henry Bertrand Van Ouytsel, Olivier Bronchain, Gaëtan Cassiers, François-Xavier Standaert
Publication date: 1 April 2022
Published in: Cryptography and Communications (Search for Journal in Brave)
Full work available at URL: http://hdl.handle.net/2078.1/247935
Recommendations
- Against deep learning side-channel attacks
- Climbing down the hierarchy: hierarchical classification for machine learning side-channel attacks
- Power analysis attack: an approach based on machine learning
- A systematic appraisal of side channel evaluation strategies
- Reinforcement learning-based design of side-channel countermeasures
Learning and adaptive systems in artificial intelligence (68T05) Cryptography (94A60) Computer security (68M25)
Cites Work
- Scikit-learn: machine learning in Python
- A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
- Towards sound approaches to counteract power-analysis attacks
- Topics in Cryptology – CT-RSA 2004
- The Myth of Generic DPA…and the Magic of Learning
- Breaking cryptographic implementations using deep learning techniques
- Consolidating masking schemes
- Convolutional neural networks with data augmentation against jitter-based countermeasures. Profiling attacks without pre-processing
- How fast can higher-order masking be in software?
- On the performance of convolutional neural networks for side-channel analysis
- A formal study of power variability issues and side-channel attacks for nanoscale devices
- Does My Device Leak Information? An a priori Statistical Power Analysis of Leakage Detection Tests
- Making Masking Security Proofs Concrete
- From improved leakage detection to the detection of points of interests in leakage traces
Cited In (2)
Uses Software
This page was built for publication: How to fool a black box machine learning based side-channel security evaluation
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2120993)