Search
Search Results
-
Like an Open Book? Read Neural Network Architecture with Simple Power Analysis on 32-Bit Microcontrollers
Model extraction is a growing concern for the security of AI systems. For deep neural network models, the architecture is the most important... -
Simple electromagnetic analysis attack based on geometric leak on ASIC implementation of ring-oscillator PUF
Physically unclonable functions (PUFs) are assumed to provide high tamper resistance against counterfeiting and hardware attacks since PUFs extract...
-
Simple Electromagnetic Analysis Against Activation Functions of Deep Neural Networks
From cloud computing to edge computing, the deployment of artificial intelligence (AI) has been evolving to fit a wide range of applications.... -
CNN Architecture Extraction on Edge GPU
Neural networks have become popular due to their versatility and state-of-the-art results in many applications, such as image classification, natural... -
Traditional Machine Learning Methods for Side-Channel Analysis
Traditional machine learning techniques (excluding deep learning) include a range of approaches, such as supervised, semi-supervised, and... -
What Is an Analog Side Channel?
This chapter introduces the concept of analog side channels and discusses how they can be categorized. -
S-box Pooling: Towards More Efficient Side-Channel Security Evaluations
Nowadays, profiled attacks are the standard penetration tests for security evaluations. Often the security evaluators have to perform profiled... -
Parasite: Mitigating Physical Side-Channel Attacks Against Neural Networks
Neural Networks (NNs) are now the target of various side-channel attacks whose aim is to recover the model’s parameters and/or architecture. We focus... -
Tuning Neural Networks for Superior Accuracy on Resource-Constrained Edge Microcontrollers
The approaches to tune Artificial neural networks (ANN) for running on edge devices, such as weight quantization, knowledge distillation, weight... -
Horizontal Attacks Against ECC: From Simulations to ASIC
In this paper we analyse the impact of different compile options on the success rate of side channel analysis attacks. We run horizontal differential... -
Security beyond cybersecurity: side-channel attacks against non-cyber systems and their countermeasures
Side-channels are unintended pathways within target systems that leak internal information, exploitable via side-channel attack techniques that...
-
A Third is All You Need: Extended Partial Key Exposure Attack on CRT-RSA with Additive Exponent Blinding
At Eurocrypt 2022, May et al. proposed a partial key exposure (PKE) attack on CRT-RSA that efficiently factors N knowing only a... -
How to Develop ECC-Based Low Cost RFID Tags Robust Against Side-Channel Attacks
Radio Frequency Identification (RFID) tags using asymmetric cryptography are more and more proposed to solve the well-known issue of symmetric-based... -
Concept of Model
In this chapter, we provide a discussion about model types and related topics. A more detailed discussion about these concepts can be found in the... -
Scatter: a Missing Case?
Scatter is a multivariate transform proposed in combination with the Chi... -
Firmware Secure Coding Practice
After we finish the security architecture and design, we need to bring security into the development phase. On the one hand, firmware is still a type... -
Physical security in the post-quantum era
Over the past decades, quantum technology has seen consistent progress, with notable recent developments in the field of quantum computers....
-
A Taxonomy of Side Channel Attacks on Critical Infrastructures and Relevant Systems
Information disclosure leads to serious exploits, disruption or damage of critical operations and privacy breaches, both in Critical Infrastructures... -
Applications of machine learning techniques in side-channel attacks: a survey
With increasing expansion of the Internet of Things, embedded devices equipped with cryptographic modules become an important factor to protect...
-
A Framework for Acquiring and Analyzing Traces from Cryptographic Devices
We present a Side-Channel Analysis Platform (SCAP) Framework developed to acquire and study the traces derived from a cryptographic device when...