Filters








255 Hits in 6.1 sec

Auto-tune POIs: Estimation of distribution algorithms for efficient side-channel analysis [article]

Unai Rioja and Lejla Batina and Jose Luis Flores and Igor Armendariz
2021 arXiv   pre-print
To this end, we introduce the usage of Estimation of Distribution Algorithms (EDAs) in the SCA field in order to automatically tune the point of interest selection.  ...  Due to the constant increase and versatility of IoT devices that should keep sensitive information private, Side-Channel Analysis (SCA) attacks on embedded devices are gaining visibility in the industrial  ...  Estimation of distribution algorithms Estimation of distribution algorithms (EDAs) are a novel class of evolutionary optimization methodology that was developed in the last decade as a natural alternative  ... 
arXiv:2012.13225v2 fatcat:pfvyi4oexnc5lp3cowox54z4oi

Auto-tune POIs: Estimation of distribution algorithms for efficient side-channel analysis

Unai Rioja, Lejla Batina, Jose Luis Flores, Igor Armendariz
2021 Computer Networks  
To this end, we propose the usage of Estimation of Distribution Algorithms (EDAs) in the SCA field to perform the point of interest selection step together with the profiling and key recovery steps.  ...  A B S T R A C T Due to the constant increase and versatility of IoT devices that should keep sensitive information private, Side-channel Analysis (SCA) attacks on embedded devices are gaining visibility  ...  The Estimation of Distribution Algorithms approach to automate the POIs selection in the SCA scenario is given in Section 4.  ... 
doi:10.1016/j.comnet.2021.108405 fatcat:mzdhdpvnfvamfdbc3nktsvs7p4

Low Complexity Correlation Power Analysis by Combining Power Trace Biasing and Correlation Distribution Techniques

Ngoc-Tuan Do, Van-Phuc Hoang, Cong-Kha Pham
2022 IEEE Access  
INDEX TERMS Correlation power analysis, side channel attack, embedded microprocessor security, power trace biasing, correlation distribution.  ...  Side channel attack (SCA) is a class of crypt-analytic attacks for security evaluation of cryptographic and embedded microprocessor implementations.  ...  [14] presented a method based on Estimation of Distribution Algorithms called EDA based profiled attack (EDA based PA) for SCA.  ... 
doi:10.1109/access.2022.3150833 fatcat:q4wkznl6b5h5dpo37khev5c73m

Breaking Cryptographic Implementations Using Deep Learning Techniques [chapter]

Houssem Maghrebi, Thibault Portigliatti, Emmanuel Prouff
2016 Lecture Notes in Computer Science  
Template attack is the most common and powerful profiled side channel attack.  ...  It relies on a realistic assumption regarding the noise of the device under attack: the probability density function of the data is a multivariate Gaussian distribution.  ...  The set of non-profiled attacks includes Differential Power Analysis (DPA) [30] , Correlation Power Analysis (CPA) [9] and Mutual Information Analysis (MIA) [20] . Side Channel Countermeasures.  ... 
doi:10.1007/978-3-319-49445-6_1 fatcat:rljymn7hprdtpoz3nbt5r73dye

PQC-SEP: Power Side-channel Evaluation Platform for Post-Quantum Cryptography Algorithms [article]

Jungmin Park, N. Nalla Anandakumar, Dipayan Saha, Dhwani Mehta, Nitin Pundir, Fahim Rahman, Farimah Farahmandi, Mark M. Tehranipoor
2022 IACR Cryptology ePrint Archive  
It specifies ease of protection against side-channel analysis (SCA) as an essential selection criterion.  ...  It automatically estimates the amount of side-channel leakage in the power profile of a PQC design at early design stages, i.e., RTL, gate level, and physical layout level.  ...  Roadmap for AI-based Side-channel Analysis The overview of an AI-based profiling side-channel attack is shown in Figure 8 .  ... 
dblp:journals/iacr/ParkASMPRFT22 fatcat:raohv4kwsrbjrefacmbcjmcfs4

SCARL: Side-Channel Analysis with Reinforcement Learning on the Ascon Authenticated Cipher [article]

Keyvan Ramezanpour, Paul Ampadu, William Diehl
2020 arXiv   pre-print
Existing side-channel analysis techniques require a leakage model, in the form of a prior knowledge or a set of training data, to establish a relationship between the secret data and the measurements.  ...  We introduce side-channel analysis with reinforcement learning (SCARL) capable of extracting data-dependent features of the measurements in an unsupervised learning approach without requiring a prior knowledge  ...  against side-channel analysis.  ... 
arXiv:2006.03995v1 fatcat:hmcsk4duq5enpmyvgkz267hmgy

Deep Learning based Side-Channel Attack: a New Profiling Methodology based on Multi-Label Classification [article]

Houssem Maghrebi
2020 IACR Cryptology ePrint Archive  
The related published investigations have demonstrated that DL-SCA are very efficient when targeting cryptographic designs protected with the common side-channel countermeasures.  ...  We validated the soundness of our proposal on simulated traces and experimental data-sets; amongst them, some are publicly available side-channel databases.  ...  Analysis [PRB09] ). • Using DL as a Points of Interest (PoI) detection method.  ... 
dblp:journals/iacr/Maghrebi20 fatcat:5or44lgjm5aebbrlliwk5veypu

DeepHMap++: Combined Projection Grouping and Correspondence Learning for Full DoF Pose Estimation

Mingliang Fu, Weijia Zhou
2019 Sensors  
In this paper, we focus on the postprocessing of a two-stage pipeline and propose to combine two learning concepts for estimating object pose under challenging scenes: projection grouping on one side,  ...  We firstly employ a local-patch based method to predict projection heatmaps which denote the confidence distribution of projection of 3D bounding box's corners.  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/s19051032 fatcat:crwnnzhlcbezza7qdxins6nbey

DeepHMap++: Combined Projection Grouping and Correspondence Learning for Full DoF Pose Estimation [article]

Mingliang Fu, Weijia Zhou
2019 arXiv   pre-print
In this paper, we focus on the postprocessing of a two-stage pipeline and propose to combine two learning concepts for estimating object pose under challenging scenes: projection grouping on one side,  ...  We firstly employ a local patch based method to predict projection heatmaps which denote the confidence distribution of projection of 3D bounding box's corners.  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
arXiv:1904.12735v1 fatcat:7ukvyqwwffb7jilugv4d2iwaxm

Deep Learning based Side Channel Attacks in Practice [article]

Houssem Maghrebi
2019 IACR Cryptology ePrint Archive  
The related published works have demonstrated that Deep Learning based Side-Channel Attacks (DL-SCA) are very efficient when targeting cryptographic implementations protected with the common side-channel  ...  The experimental results obtained confirm that DL-SCA are very efficient even when a cryptographic implementation combines several side-channel countermeasures.  ...  The Gaussian assumption stipulates that the distribution of the leakage when the algorithm inputs are fixed is well estimated by a Gaussian Law.  ... 
dblp:journals/iacr/Maghrebi19 fatcat:eokzooe7xjhhvgx4huxb4wbewm

Advances in vehicular ad-hoc networks (VANETs): Challenges and road-map for future development

Elias C. Eze, Si-Jing Zhang, En-Jie Liu, Joy C. Eze
2016 International Journal of Automation and Computing  
and intelligent wireless communication protocols and access technologies for reliable, efficient and timely information exchange.  ...  Hence, government, auto-mobile industries and academia are heavily partnering through several ongoing research projects to establish standards for VANETs.  ...  improved quality of the paper.  ... 
doi:10.1007/s11633-015-0913-y fatcat:5nrpxpiuiba2bo72veap3gcdfa

A Survey on Machine-Learning Techniques for UAV-Based Communications

Petros S Bithas, Emmanouel T Michailidis, Nikolaos Nomikos, Demosthenes Vouyioukas, Athanasios G Kanatas
2019 Sensors  
as channel modeling, resource management, positioning, and security.  ...  In this article, we provide a detailed survey of all relevant research works, in which ML techniques have been used on UAV-based communications for improving various design and functional aspects such  ...  In Reference [115] , an unsupervised online self-tuning learning algorithm for joint mobility prediction and object profiling of the individual UAVs was proposed.  ... 
doi:10.3390/s19235170 pmid:31779133 pmcid:PMC6929112 fatcat:pnur7lmpj5bj7poebmdfpd6bhi

Automated condition-invariable neurite segmentation and synapse classification using textural analysis-based machine-learning algorithms

Umasankar Kandaswamy, Ziv Rotman, Dana Watt, Ian Schillebeeckx, Valeria Cavalli, Vitaly A. Klyachko
2013 Journal of Neuroscience Methods  
The lack of automated image analysis tools that can be generalized for varying image acquisition conditions represents one of the main challenges in the field of biomedical image analysis.  ...  Here we describe a fully automated machine-learning approach based on textural analysis algorithms for segmenting neuronal arborizations in high-resolution brightfield images of live cultured neurons.  ...  We thank Diana Owyoung and members of the Klyachko lab for the constructive comments on the manuscript. We also thank Drs. Danuser and Jaqaman for kindly sharing their U-track software.  ... 
doi:10.1016/j.jneumeth.2012.12.011 pmid:23261652 pmcid:PMC3721977 fatcat:zj6w6nna7zbflcwrk4pq5ss6ly

A Survey on 5G Radio Access Network Energy Efficiency: Massive MIMO, Lean Carrier Design, Sleep Modes, and Machine Learning [article]

David Lopez-Perez, Antonio De Domenico, Nicola Piovesan, Harvey Bao, Geng Xinli, Song Qitao, Merouane Debbah
2021 arXiv   pre-print
In this survey paper, we thoroughly review the state-of-the-art on current energy efficiency research.  ...  We first categorise and carefully analyse the different power consumption models and energy efficiency metrics, which have helped to make progress on the understanding of green networks.  ...  Specifically, three types of data sets are considered, i.e., BSs location, POIs distribution, and social activity level.  ... 
arXiv:2101.11246v2 fatcat:rm6e5ubwdnf25kvgdufvtd5uam

Network-enabled monitoring and stable control of dynamic systems [article]

Poi Loon Tang
2005
The constructive and computationally inexpensive strategy, which is developed here, uses predictions of future control actions and estimations of possibly erroneous sensory signals, to maintain good performance  ...  The integration of computers, communication, and control in modern distributed systems such as intelligent transit systems and industrial facilities has garnered a great deal of attention in recent years  ...  Some enhancements that improve the computational efficiency of the algorithm for building the binary search trees are carried out.  ... 
doi:10.14288/1.0080703 fatcat:pmffl5agund3nhxlkgw5h6sqwa
« Previous Showing results 1 — 15 out of 255 results