Profiled Side-Channel Analysis in the Efficient Attacker Framework

More Info
expand_more

Abstract

Profiled side-channel attacks represent the most powerful category of side-channel attacks. There, the attacker has access to a clone device to profile its leaking behavior. Additionally, it is common to consider the attacker unbounded in power to allow the worst-case security analysis. This paper starts with a different premise where we are interested in the minimum power that the attacker requires to conduct a successful attack. We propose a new framework for profiled side-channel analysis that we call the Efficient Attacker Framework. With it, we require attacks to be as powerful as possible, but we also provide a setting that inherently allows a more objective analysis among attacks. To confirm our theoretical results, we provide an experimental evaluation of our framework in the context of deep learning-based side-channel analysis.

Files

Efficient_Attacker_Framework_1... (pdf)
(pdf | 0.857 Mb)

Download not available

Picek2022_Chapter_ProfiledSide... (pdf)
(pdf | 3.16 Mb)
- Embargo expired in 01-07-2023