旁道攻击
计算机科学
利用
密码学
功率分析
计算机安全
频道(广播)
加密
深度学习
软件
人工智能
计算机网络
操作系统
作者
Amina Amrouche,Larbi Boubchir,Said Yahiaoui
标识
DOI:10.1109/sds57574.2022.10062906
摘要
The overwhelming majority of significant security threats are hardware-based, where the attackers attempt to steal information straight from the hardware that our secure and encrypted software operates on. Unquestionably, side-channel attacks are one of the most severe risks to hardware security. Rather than depending on bugs in the program itself, a side-channel attack exploits information leaked from the program implementation in order to exfiltrate sensitive secret information such as cryptographic keys. A side channel assault could manifest in different ways including electromagnetic radiation, power consumption, timing data, or even acoustic emanation. Ever since the side-channel attacks were introduced in the 1990s, a number of significant attacks on cryptographic implementations utilizing side-channel analysis have emerged, such as template attacks, and attacks based on power analysis and electromagnetic analysis. However, Artificial Intelligence has become more prevalent. Attackers are now more interested in machine learning and deep learning technologies that enable them to interpret the extracted raw data. The aim of this paper is to highlight the main methods of machine learning and deep learning that are used in the most recent studies that deal with different types of side-channel attacks.
科研通智能强力驱动
Strongly Powered by AbleSci AI