A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is application/pdf
.
Filters
Auto-tune POIs: Estimation of distribution algorithms for efficient side-channel analysis
[article]
2021
arXiv
pre-print
To this end, we introduce the usage of Estimation of Distribution Algorithms (EDAs) in the SCA field in order to automatically tune the point of interest selection. ...
Due to the constant increase and versatility of IoT devices that should keep sensitive information private, Side-Channel Analysis (SCA) attacks on embedded devices are gaining visibility in the industrial ...
Estimation of distribution algorithms Estimation of distribution algorithms (EDAs) are a novel class of evolutionary optimization methodology that was developed in the last decade as a natural alternative ...
arXiv:2012.13225v2
fatcat:pfvyi4oexnc5lp3cowox54z4oi
Auto-tune POIs: Estimation of distribution algorithms for efficient side-channel analysis
2021
Computer Networks
To this end, we propose the usage of Estimation of Distribution Algorithms (EDAs) in the SCA field to perform the point of interest selection step together with the profiling and key recovery steps. ...
A B S T R A C T Due to the constant increase and versatility of IoT devices that should keep sensitive information private, Side-channel Analysis (SCA) attacks on embedded devices are gaining visibility ...
The Estimation of Distribution Algorithms approach to automate the POIs selection in the SCA scenario is given in Section 4. ...
doi:10.1016/j.comnet.2021.108405
fatcat:mzdhdpvnfvamfdbc3nktsvs7p4
Low Complexity Correlation Power Analysis by Combining Power Trace Biasing and Correlation Distribution Techniques
2022
IEEE Access
INDEX TERMS Correlation power analysis, side channel attack, embedded microprocessor security, power trace biasing, correlation distribution. ...
Side channel attack (SCA) is a class of crypt-analytic attacks for security evaluation of cryptographic and embedded microprocessor implementations. ...
[14] presented a method based on Estimation of Distribution Algorithms called EDA based profiled attack (EDA based PA) for SCA. ...
doi:10.1109/access.2022.3150833
fatcat:q4wkznl6b5h5dpo37khev5c73m
Breaking Cryptographic Implementations Using Deep Learning Techniques
[chapter]
2016
Lecture Notes in Computer Science
Template attack is the most common and powerful profiled side channel attack. ...
It relies on a realistic assumption regarding the noise of the device under attack: the probability density function of the data is a multivariate Gaussian distribution. ...
The set of non-profiled attacks includes Differential Power Analysis (DPA) [30] , Correlation Power Analysis (CPA) [9] and Mutual Information Analysis (MIA) [20] . Side Channel Countermeasures. ...
doi:10.1007/978-3-319-49445-6_1
fatcat:rljymn7hprdtpoz3nbt5r73dye
PQC-SEP: Power Side-channel Evaluation Platform for Post-Quantum Cryptography Algorithms
[article]
2022
IACR Cryptology ePrint Archive
It specifies ease of protection against side-channel analysis (SCA) as an essential selection criterion. ...
It automatically estimates the amount of side-channel leakage in the power profile of a PQC design at early design stages, i.e., RTL, gate level, and physical layout level. ...
Roadmap for AI-based Side-channel Analysis The overview of an AI-based profiling side-channel attack is shown in Figure 8 . ...
dblp:journals/iacr/ParkASMPRFT22
fatcat:raohv4kwsrbjrefacmbcjmcfs4
SCARL: Side-Channel Analysis with Reinforcement Learning on the Ascon Authenticated Cipher
[article]
2020
arXiv
pre-print
Existing side-channel analysis techniques require a leakage model, in the form of a prior knowledge or a set of training data, to establish a relationship between the secret data and the measurements. ...
We introduce side-channel analysis with reinforcement learning (SCARL) capable of extracting data-dependent features of the measurements in an unsupervised learning approach without requiring a prior knowledge ...
against side-channel analysis. ...
arXiv:2006.03995v1
fatcat:hmcsk4duq5enpmyvgkz267hmgy
Deep Learning based Side-Channel Attack: a New Profiling Methodology based on Multi-Label Classification
[article]
2020
IACR Cryptology ePrint Archive
The related published investigations have demonstrated that DL-SCA are very efficient when targeting cryptographic designs protected with the common side-channel countermeasures. ...
We validated the soundness of our proposal on simulated traces and experimental data-sets; amongst them, some are publicly available side-channel databases. ...
Analysis [PRB09] ). • Using DL as a Points of Interest (PoI) detection method. ...
dblp:journals/iacr/Maghrebi20
fatcat:5or44lgjm5aebbrlliwk5veypu
DeepHMap++: Combined Projection Grouping and Correspondence Learning for Full DoF Pose Estimation
2019
Sensors
In this paper, we focus on the postprocessing of a two-stage pipeline and propose to combine two learning concepts for estimating object pose under challenging scenes: projection grouping on one side, ...
We firstly employ a local-patch based method to predict projection heatmaps which denote the confidence distribution of projection of 3D bounding box's corners. ...
Conflicts of Interest: The authors declare no conflict of interest. ...
doi:10.3390/s19051032
fatcat:crwnnzhlcbezza7qdxins6nbey
DeepHMap++: Combined Projection Grouping and Correspondence Learning for Full DoF Pose Estimation
[article]
2019
arXiv
pre-print
In this paper, we focus on the postprocessing of a two-stage pipeline and propose to combine two learning concepts for estimating object pose under challenging scenes: projection grouping on one side, ...
We firstly employ a local patch based method to predict projection heatmaps which denote the confidence distribution of projection of 3D bounding box's corners. ...
Conflicts of Interest: The authors declare no conflict of interest. ...
arXiv:1904.12735v1
fatcat:7ukvyqwwffb7jilugv4d2iwaxm
Deep Learning based Side Channel Attacks in Practice
[article]
2019
IACR Cryptology ePrint Archive
The related published works have demonstrated that Deep Learning based Side-Channel Attacks (DL-SCA) are very efficient when targeting cryptographic implementations protected with the common side-channel ...
The experimental results obtained confirm that DL-SCA are very efficient even when a cryptographic implementation combines several side-channel countermeasures. ...
The Gaussian assumption stipulates that the distribution of the leakage when the algorithm inputs are fixed is well estimated by a Gaussian Law. ...
dblp:journals/iacr/Maghrebi19
fatcat:eokzooe7xjhhvgx4huxb4wbewm
Advances in vehicular ad-hoc networks (VANETs): Challenges and road-map for future development
2016
International Journal of Automation and Computing
and intelligent wireless communication protocols and access technologies for reliable, efficient and timely information exchange. ...
Hence, government, auto-mobile industries and academia are heavily partnering through several ongoing research projects to establish standards for VANETs. ...
improved quality of the paper. ...
doi:10.1007/s11633-015-0913-y
fatcat:5nrpxpiuiba2bo72veap3gcdfa
A Survey on Machine-Learning Techniques for UAV-Based Communications
2019
Sensors
as channel modeling, resource management, positioning, and security. ...
In this article, we provide a detailed survey of all relevant research works, in which ML techniques have been used on UAV-based communications for improving various design and functional aspects such ...
In Reference [115] , an unsupervised online self-tuning learning algorithm for joint mobility prediction and object profiling of the individual UAVs was proposed. ...
doi:10.3390/s19235170
pmid:31779133
pmcid:PMC6929112
fatcat:pnur7lmpj5bj7poebmdfpd6bhi
Automated condition-invariable neurite segmentation and synapse classification using textural analysis-based machine-learning algorithms
2013
Journal of Neuroscience Methods
The lack of automated image analysis tools that can be generalized for varying image acquisition conditions represents one of the main challenges in the field of biomedical image analysis. ...
Here we describe a fully automated machine-learning approach based on textural analysis algorithms for segmenting neuronal arborizations in high-resolution brightfield images of live cultured neurons. ...
We thank Diana Owyoung and members of the Klyachko lab for the constructive comments on the manuscript. We also thank Drs. Danuser and Jaqaman for kindly sharing their U-track software. ...
doi:10.1016/j.jneumeth.2012.12.011
pmid:23261652
pmcid:PMC3721977
fatcat:zj6w6nna7zbflcwrk4pq5ss6ly
A Survey on 5G Radio Access Network Energy Efficiency: Massive MIMO, Lean Carrier Design, Sleep Modes, and Machine Learning
[article]
2021
arXiv
pre-print
In this survey paper, we thoroughly review the state-of-the-art on current energy efficiency research. ...
We first categorise and carefully analyse the different power consumption models and energy efficiency metrics, which have helped to make progress on the understanding of green networks. ...
Specifically, three types of data sets are considered, i.e., BSs location, POIs distribution, and social activity level. ...
arXiv:2101.11246v2
fatcat:rm6e5ubwdnf25kvgdufvtd5uam
Network-enabled monitoring and stable control of dynamic systems
[article]
2005
The constructive and computationally inexpensive strategy, which is developed here, uses predictions of future control actions and estimations of possibly erroneous sensory signals, to maintain good performance ...
The integration of computers, communication, and control in modern distributed systems such as intelligent transit systems and industrial facilities has garnered a great deal of attention in recent years ...
Some enhancements that improve the computational efficiency of the algorithm for building the binary search trees are carried out. ...
doi:10.14288/1.0080703
fatcat:pmffl5agund3nhxlkgw5h6sqwa
« Previous
Showing results 1 — 15 out of 255 results