搜索结果: 1-11 共查到“军事学 profiling”相关记录11条 . 查询时间(0.046 秒)
Methodology for Efficient CNN Architectures in Profiling Attacks
Side-Channel Attacks Deep Learning Architecture
2019/7/15
The side-channel community has recently investigated a new approach, based on deep learning, to significantly improve profiled attacks against embedded systems. Previous works have shown the benefit o...
Vulnerability Analysis of a Soft Core Processor through Fine-grain Power Profiling
Cryptography FPGA microprocessor
2019/6/26
Embedded microprocessors are an important component of reconfigurable architectures. Fine-grain (e.g., cycle-accurate) power analysis of such processors has been used to improve power and energy effic...
Profiling Side-channel Analysis in the Restricted Attacker Framework
Side-channel analysis Machine learning Deep learning
2019/2/25
Profiling side-channel attacks represent the most powerful category of side-channel attacks. There, we assume that the attacker has access to a clone device in order to profile the device. Additionall...
Gradient Visualization for General Characterization in Profiling Attacks
Side Channel Analysis Profiling Attacks Deep Learning,
2018/12/19
Past few years have seen the emergence of Machine Learning and Deep Learning algorithms as promising tools for profiling attacks, especially Convolutional Neural Networks (CNN). The latters have indee...
Convolutional Neural Networks with Data Augmentation against Jitter-Based Countermeasures -- Profiling Attacks without Pre-Processing --
side channel attacks machine learning deep learning
2017/8/10
In the context of the security evaluation of cryptographic implementations, profiling attacks (aka Template Attacks) play a fundamental role. Nowadays the most popular Template Attack strategy consist...
Profiling Good Leakage Models For Masked Implementations
leakage certification HODPA masking
2017/7/6
Leakage model plays a very important role in side channel attacks. An accurate leakage model greatly improves the efficiency of attacks. However, how to profile a "good enough" leakage model, or how t...
Robust Profiling for DPA-Style Attacks
side-channel analysis differential power analysis machine learning
2015/12/30
Profiled side-channel attacks are understood to be powerful when applicable: in
the best case when an adversary can comprehensively characterise the leakage, the resulting
model leads to attacks req...
Linear regression-based methods have been proposed as efficient means of characterising device leakage in the training phases of profiled side-channel attacks. Empirical comparisons between these and ...
Profiling power attacks like Template attack and Stochastic attack optimizes their performance by jointly evaluating the leakages of multiple sample points. However, such multivariate approaches are r...
Pushing the Limit of Non-Profiling DPA using Multivariate Leakage Model
leakage model multivariate leakage model
2014/3/5
Profiling power attacks like Template attack and Stochastic attack optimize their performance by jointly evaluating the leakages of multiple sample points. However, such multivariate approaches are ra...
The goal of a profiling attack is to challenge the security of a cryptographic device in the worst case scenario. Though template attack are reputed as the strongest power analysis attack, they effect...