kth.sePublications
System disruptions
We are currently experiencing disruptions on the search portals due to high traffic. We are working to resolve the issue, you may temporarily encounter an error message.
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Deep-Learning Side-Channel Attack Against STM32 Implementation of AES
Hunan Univ Sci & Technol, Sch Phys & Elect Sci, Xiangtan, Hunan, Peoples R China..
KTH, School of Electrical Engineering and Computer Science (EECS), Electrical Engineering.ORCID iD: 0000-0001-9630-5869
Hunan Univ Sci & Technol, Sch Phys & Elect Sci, Xiangtan, Hunan, Peoples R China..
2021 (English)In: 2021 International Conference On Computational Science And Computational Intelligence (CSCI 2021), Institute of Electrical and Electronics Engineers (IEEE) , 2021, p. 844-847Conference paper, Published paper (Refereed)
Abstract [en]

Deep-Learning Side-Channel Attacks (DLSCAs) have become a realistic threat to cryptographic algorithms, such as Advanced Encryption Standard (AES). Since the encryption has to run in hardware at some point to actually do things, there might be some unintentional physical leakage, such as the different amount of power consumed by the victim device. By using deep-learning models to analyze the power traces, the attacker is able to derive the secret key. In this project, we implement a real deep-learning based attack to against a STM32 implementation of AES. We apply four different types of neural networks, MLP, CNN, LSTM and RNN, to classify traces. Afterwards, we evaluate to which extent different types of models could make the attack more efficient.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE) , 2021. p. 844-847
Keywords [en]
Side-channel attack, MLP, CNN, LSTM, RNN
National Category
Computer Engineering Computer Sciences Information Systems
Identifiers
URN: urn:nbn:se:kth:diva-316735DOI: 10.1109/CSCI54926.2021.00030ISI: 000832229300148Scopus ID: 2-s2.0-85133913927OAI: oai:DiVA.org:kth-316735DiVA, id: diva2:1691388
Conference
International Conference on Computational Science and Computational Intelligence (CSCI), DEC 15-17, 2021, Las Vegas, NV
Note

Part of proceedings: ISBN 978-1-6654-5841-2, QC 20220830

Available from: 2022-08-30 Created: 2022-08-30 Last updated: 2022-09-07Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full textScopus

Authority records

Wang, Huanyu

Search in DiVA

By author/editor
Wang, Huanyu
By organisation
Electrical Engineering
Computer EngineeringComputer SciencesInformation Systems

Search outside of DiVA

GoogleGoogle Scholar

doi
urn-nbn

Altmetric score

doi
urn-nbn
Total: 109 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf