scholarly journals MLP and CNN-based Classification of Points of Interest in Side-channel Attacks

Author(s):  
Hanwen Feng ◽  
Weiguo Lin ◽  
Wenqian Shang ◽  
Jianxiang Cao ◽  
Wei Huang
Computer ◽  
2020 ◽  
Vol 53 (8) ◽  
pp. 40-48
Author(s):  
Hanwen Feng ◽  
Jing Zhou ◽  
Weiguo Lin ◽  
Yujuan Zhang ◽  
Zhiguo Qu

2018 ◽  
Vol 28 (01) ◽  
pp. 1950003 ◽  
Author(s):  
E. Saeedi ◽  
M. S. Hossain ◽  
Y. Kong

The safety of cryptosystems, mainly based on algorithmic improvement, is still vulnerable to side-channel attacks (SCA) based on machine learning. Multi-class classification based on neural networks and principal components analysis (PCA) can be powerful tools for pattern recognition and classification of side-channel information. In this paper, an experimental investigation was conducted to explore the efficiency of various architectures of feed-forward back-propagation (FFBP) neural networks and PCA against side-channel attacks. The experiment is performed on the data leakage of an FPGA implementation of elliptic curve cryptography (ECC). Our results show that the proposed method is a promising method for SCA with an overall accuracy of 88% correct classification.


2018 ◽  
Vol 20 (1) ◽  
pp. 465-488 ◽  
Author(s):  
Raphael Spreitzer ◽  
Veelasha Moonsamy ◽  
Thomas Korak ◽  
Stefan Mangard

2021 ◽  
Vol 37 (1) ◽  
pp. 1-22
Author(s):  
Ngoc Quy Tran ◽  
Hong Quang Nguyen

Profiled side-channel attacks are now considered as powerful forms of attacks used to break the security of cryptographic devices. A recent line of research has investigated a new profiled attack based on deep learning and many of them have used convolution neural network (CNN) as deep learning architecture for the attack. The effectiveness of the attack is greatly influenced by the CNN architecture. However, the CNN architecture used for current profiled attacks have often been based on image recognition fields, and choosing the right CNN architectures and parameters for adaption to profiled attacks is still challenging. In this paper, we propose an efficient profiled attack for on unprotected and masking-protected cryptographic devices based on two CNN architectures, called CNNn, CNNd respectively. Both of CNN architecture parameters proposed in this paper are based on the property of points of interest on the power trace and further determined by the Grey Wolf Optimization (GWO) algorithm. To verify the proposed attacks, experiments were performed on a trace set collected from an Atmega8515 smart card when it performs AES-128 encryption, a DPA contest v4 dataset and the ASCAD public dataset


2009 ◽  
Vol 19 (11) ◽  
pp. 2990-2998 ◽  
Author(s):  
Tao ZHANG ◽  
Ming-Yu FAN

Sign in / Sign up

Export Citation Format

Share Document