img

تفاصيل البطاقة الفهرسية

Side Channel Attack using Machine Learning

مقال من تأليف: Boubchir, Larbi ; Yahiaoui, Saïd ; Amrouche, Amina ;

ملخص: The overwhelming majority of significant security threats are hardware-based, where the attackers attempt to steal information straight from the hardware that our secure and encrypted software operates on. Unquestionably, side-channel attacks are one of the most severe risks to hardware security. Rather than depending on bugs in the program itself, a side-channel attack exploits information leaked from the program implementation in order to exfiltrate sensitive secret information such as cryptographic keys. A side channel assault could manifest in different ways including electromagnetic radiation, power consumption, timing data, or even acoustic emanation. Ever since the side-channel attacks were introduced in the 1990s, a number of significant attacks on cryptographic implementations utilizing side-channel analysis have emerged, such as template attacks, and attacks based on power analysis and electromagnetic analysis. However, Artificial Intelligence has become more prevalent. Attackers are now more interested in machine learning and deep learning technologies that enable them to interpret the extracted raw data. The aim of this paper is to highlight the main methods of machine learning and deep learning that are used in the most recent studies that deal with different types of side-channel attacks.


لغة: إنجليزية
الموضوع الإعلام الآلي

الكلمات الدالة:
Deep learning
Machine learning
Side-channel attacks
Power analysis
Electromagnetic analysis

Side Channel Attack using Machine Learning

الفهرس