Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Increasing Side-Channel Resistance by Netlist Randomization and FPGA-Based Reconfiguration

    Modern FPGAs are equipped with the possibility of Partial Reconfiguration (PR) which along with other benefits can be used to enhance the security of cryptographic implementations. This feature requires develo...

    Ali Asghar, Benjamin Hettwer, Emil Karimov in Applied Reconfigurable Computing. Architec… (2021)

  2. No Access

    Chapter and Conference Paper

    Moving Target and Implementation Diversity Based Countermeasures Against Side-Channel Attacks

    Side-channel attacks (SCAs) are among the major threats to embedded systems’ security, where implementation characteristics of cryptographic algorithms are exploited to extract secret parameters. The most comm...

    Nadir Khan, Benjamin Hettwer, Jürgen Becker in Applied Reconfigurable Computing. Architec… (2021)

  3. No Access

    Article

    Applications of machine learning techniques in side-channel attacks: a survey

    With increasing expansion of the Internet of Things, embedded devices equipped with cryptographic modules become an important factor to protect sensitive data. Even though the employed algorithms in such devic...

    Benjamin Hettwer, Stefan Gehrer, Tim Güneysu in Journal of Cryptographic Engineering (2020)

  4. No Access

    Chapter and Conference Paper

    Deep Neural Network Attribution Methods for Leakage Analysis and Symmetric Key Recovery

    Deep Neural Networks (DNNs) have recently received significant attention in the side-channel community due to their state-of-the-art performance in security testing of embedded systems. However, research on t...

    Benjamin Hettwer, Stefan Gehrer, Tim Güneysu in Selected Areas in Cryptography – SAC 2019 (2020)

  5. Chapter and Conference Paper

    Profiled Power Analysis Attacks Using Convolutional Neural Networks with Domain Knowledge

    Evaluation of cryptographic implementations against profiled side-channel attacks plays a fundamental role in security testing nowadays. Recently, deep neural networks and especially Convolutional Neural Netwo...

    Benjamin Hettwer, Stefan Gehrer, Tim Güneysu in Selected Areas in Cryptography – SAC 2018 (2019)