Convolutional Neural Network Based Side-Channel Attacks in Time-Frequency Representations
暂无分享,去创建一个
Guang Yang | Huizhong Li | Yongbin Zhou | Jingdian Ming | Yongbin Zhou | Huizhong Li | Guang Yang | Jingdian Ming
[1] Paul C. Kocher,et al. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.
[2] Paul C. Kocher,et al. Differential Power Analysis , 1999, CRYPTO.
[3] Quoc V. Le,et al. On optimization methods for deep learning , 2011, ICML.
[4] Cécile Canovas,et al. Study of Deep Learning Techniques for Side-Channel Analysis and Introduction to ASCAD Database , 2018, IACR Cryptol. ePrint Arch..
[5] Liwei Zhang,et al. Efficient 2nd-order power analysis on masked devices utilizing multiple leakage , 2015, 2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).
[6] Markus G. Kuhn,et al. Efficient, Portable Template Attacks , 2018, IEEE Transactions on Information Forensics and Security.
[7] Wim Lamotte,et al. Improving CEMA using Correlation Optimization , 2018, IACR Trans. Cryptogr. Hardw. Embed. Syst..
[8] Michael Tunstall,et al. SoC It to EM: ElectroMagnetic Side-Channel Attacks on a Complex System-on-Chip , 2015, CHES.
[9] Christophe Clavier,et al. Correlation Power Analysis with a Leakage Model , 2004, CHES.
[10] I. Jolliffe. Principal Component Analysis , 2005 .
[11] Vijayan K. Asari,et al. The History Began from AlexNet: A Comprehensive Survey on Deep Learning Approaches , 2018, ArXiv.
[12] Dawu Gu,et al. Trace Augmentation: What Can Be Done Even Before Preprocessing in a Profiled SCA? , 2017, CARDIS.
[13] Annelie Heuser,et al. The Curse of Class Imbalance and Conflicting Metrics with Machine Learning for Side-channel Evaluations , 2018, IACR Cryptol. ePrint Arch..
[14] Sylvain Guilley,et al. Wavelet transform based pre-processing for side channel analysis , 2012, 2012 45th Annual IEEE/ACM International Symposium on Microarchitecture Workshops.
[15] Cécile Canovas,et al. Convolutional Neural Networks with Data Augmentation Against Jitter-Based Countermeasures - Profiling Attacks Without Pre-processing , 2017, CHES.
[16] Jian Sun,et al. Delving Deep into Rectifiers: Surpassing Human-Level Performance on ImageNet Classification , 2015, 2015 IEEE International Conference on Computer Vision (ICCV).
[17] Sebastian Ruder,et al. An overview of gradient descent optimization algorithms , 2016, Vestnik komp'iuternykh i informatsionnykh tekhnologii.
[18] Jean Ponce,et al. A Theoretical Analysis of Feature Pooling in Visual Recognition , 2010, ICML.
[19] Markus G. Kuhn,et al. Efficient Template Attacks , 2013, CARDIS.
[20] Min-Ku Kim,et al. CPA performance enhancement based on spectrogram , 2012, 2012 IEEE International Carnahan Conference on Security Technology (ICCST).
[21] Bart Preneel,et al. Mutual Information Analysis , 2008, CHES.
[22] Christof Paar,et al. A Stochastic Model for Differential Side Channel Cryptanalysis , 2005, CHES.
[23] Moti Yung,et al. A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks (extended version) , 2009, IACR Cryptol. ePrint Arch..
[24] Pankaj Rohatgi,et al. Template Attacks , 2002, CHES.
[25] Andrew Zisserman,et al. Very Deep Convolutional Networks for Large-Scale Image Recognition , 2014, ICLR.
[26] Emmanuel Prouff,et al. Breaking Cryptographic Implementations Using Deep Learning Techniques , 2016, SPACE.
[27] Axel Legay,et al. On the Performance of Convolutional Neural Networks for Side-Channel Analysis , 2018, SPACE.
[28] Geoffrey E. Hinton,et al. ImageNet classification with deep convolutional neural networks , 2012, Commun. ACM.
[29] Catherine H. Gebotys,et al. A new correlation frequency analysis of the side channel , 2010, WESS '10.
[30] Alan Hanjalic,et al. Make Some Noise: Unleashing the Power of Convolutional Neural Networks for Profiled Side-channel Analysis , 2019, IACR Cryptol. ePrint Arch..
[31] Yuan Yu,et al. TensorFlow: A system for large-scale machine learning , 2016, OSDI.