搜索结果: 1-15 共查到“军队指挥学 Side channel analysis”相关记录42条 . 查询时间(0.078 秒)
Deep Learning Model Generalization in Side-Channel Analysis
Side-Channel Analysis Deep Learning Model Generalization
2019/8/30
The adoption of deep neural networks for profiled side-channel attacks provides different capabilities for leakage detection of secure products. Research papers provide a variety of arguments with res...
Machine learning and side channel analysis in a CTF competition
key recovery deep learning machine learning
2019/7/25
Machine learning is nowadays supplanting or extending human expertise in many domains ranging from board games to text translation. Correspondingly, the use of such tools is also on the rise in comput...
Neural Network Model Assessment for Side-Channel Analysis
Side-Channel Analysis Neural Networks Model Assessment
2019/6/19
Leakage assessment of cryptographic implementations with side-channel analysis relies on two important assumptions: leakage model and the number of side-channel traces. In the context of profiled side...
Mind the Portability: A Warriors Guide through Realistic Profiled Side-channel Analysis
Side-channel attacks Machine learning Portability
2019/6/5
Profiled side-channel attacks represent a practical threat to digital devices, thereby having the potential to disrupt the foundation of e-commerce, Internet-of-Things (IoT), and smart cities. In the ...
Bias-variance Decomposition in Machine Learning-based Side-channel Analysis
Side-channel analysis Machine learning Deep learning
2019/5/28
Machine learning techniques represent a powerful option in profiling side-channel analysis. Still, there are many settings where their performance is far from expected. In such occasions, it is very i...
Revisiting Location Privacy from a Side-Channel Analysis Viewpoint (Extended Version)
side-channel analysis location privacy
2019/5/13
Inspired by the literature on side-channel attacks against cryptographic implementations, we describe a framework for the analysis of location privacy. It allows us to revisit (continuous) re-identifi...
A Comprehensive Study of Deep Learning for Side-Channel Analysis
Side Channel Analysis Profiling Attacks Machine Learning
2019/5/5
In Side Channel Analysis, masking is known to be a reliable and robust counter-measure. Recently, several papers have focused on the application of the Deep Learning (DL) theory to improve the efficie...
Physical Unclonable Functions (PUFs) have the potential to provide a higher level of security for key storage than traditional Non-Volatile Memory (NVM). However, the susceptibility of the PUF primiti...
Profiling Side-channel Analysis in the Restricted Attacker Framework
Side-channel analysis Machine learning Deep learning
2019/2/25
Profiling side-channel attacks represent the most powerful category of side-channel attacks. There, we assume that the attacker has access to a clone device in order to profile the device. Additionall...
When Theory Meets Practice: A Framework for Robust Profiled Side-channel Analysis
Machine Learning Robustness Analysis Supervised Learning
2018/11/21
Profiled side-channel attacks are the most powerful attacks and they consist of two steps. The adversary first builds a leakage model, using a device similar to the target one, then it exploits this l...
Make Some Noise: Unleashing the Power of Convolutional Neural Networks for Profiled Side-channel Analysis
Side-channel analysis Convolutional Neural Networks Machine learning
2018/11/2
Profiled side-channel attacks based on deep learning, and more precisely Convolutional Neural Networks, is a paradigm showing significant potential. The results, although scarce for now, suggest that ...
Static Power Side-Channel Analysis - A Survey on Measurement Factors
CMOS Measurement Factors
2018/7/16
The static power consumption of modern CMOS devices has become a substantial concern in the context of the side-channel security of cryptographic hardware. Its continuous growth in nanometer-scaled te...
Side-Channel Analysis of SM2: A Late-Stage Featurization Case Study
applied cryptography public-key cryptography side-channel analysis
2018/7/9
SM2 is a public key cryptography suite originating from Chinese standards, including digital signatures and public key encryption. Ahead of schedule, code for this functionality was recently mainlined...
Symbolic Side-Channel Analysis for Probabilistic Programs
Side-Channel Attacks Quantitative Information Flow Symbolic Execution
2018/4/11
In this paper we describe symbolic side-channel analysis techniques for detecting and quantifying information leakage, given in terms of Shannon and Min Entropy. Measuring the precise leakage is chall...
Study of Deep Learning Techniques for Side-Channel Analysis and Introduction to ASCAD Database
Deep Learning Side-Channel Analysis AES
2018/1/15
To provide insurance on the resistance of a system against side-channel analysis, several national or private schemes are today promoting an evaluation strategy, common in classical cryptography, whic...