As of August 2020 the site you are on (wiki.newae.com) is deprecated, and content is now at rtfm.newae.com.

Changes

Jump to: navigation, search

Academic Papers

25 bytes added, 17:32, 28 June 2017
2016
* Usage: FPGA code from the ChipWhisperer code base on the clock glitcher module implemented on the control FPGA (Spartan XC6SLX9)
* [http://ieeexplore.ieee.org/abstract/document/7560241/ IEEE Link]
<br>
Dofe, J., Frey, J., & Yu, Q. (2016, May). '''Hardware security assurance in emerging IoT applications.''' In ''Circuits and Systems (ISCAS), 2016 IEEE International Symposium on'' (pp. 2050-2053). IEEE.
* Summary: This paper proposes a low-cost dynamic permutation method for IoT devices where sophisticated cryptographic algorithms and authentication protocols are not suitable due to iot devices often having limited computational power and having the need to be energy efficient.
* Usage: ChipWhisperer software to capture power traces for side-channel analysis
* [http://ieeexplore.ieee.org/abstract/document/7538981/ IEEE Link]
<br>
Dofe, J., Pahlevanzadeh, H., & Yu, Q. (2016). '''A comprehensive FPGA-based assessment on fault-resistant AES against correlation power analysis attack.''' ''Journal of Electronic Testing'', ''32''(5), 611-624.
* Summary: This paper uses a FPGA-based platform to investigate whether and how the FA countermeasure can influence the efficiency of the correlation power analysis (CPA) attack and propose a new countermeasure that integrates dynamic masking and error deflection to simultaneously thwart CPA and FA attacks.
* Usage: ChipWhisperer software to perform power trace capturing and analysis with the ChipWhisperer Capture Hardware SAKURA-G
* [http://link.springer.com/article/10.1007/s10836-016-5598-9 Springer Link]
<br>
Ahn, H., & Han, D. G. '''Multilateral White-Box Cryptanalysis.'''
* Summary: This paper proposes a DPA-based attack that directly exploits the intermediate values of WB-AES computation without the requirement of utilizing memory data.
* Usage: ChipWhisperer-Lite to capture power traces for analysis
* [http://eprint.iacr.org/2016/807.pdf PDF Link]
<br>
Maghrebi, H., Portigliatti, T., & Prouff, E. (2016, December). '''Breaking Cryptographic Implementations Using Deep Learning Techniques.''' In ''International Conference on Security, Privacy, and Applied Cryptography Engineering'' (pp. 3-26). Springer International Publishing.
* Summary: This paper proposes to continue a recent line of research of profiling approaches using machine learning techniques, by applying more sophisticated profiling techniques based on deep learning.
* [https://link.springer.com/chapter/10.1007/978-3-319-49445-6_1 Springer Link]
* [http://eprint.iacr.org/2016/921.pdf PDF Link]
<br>
Nascimento, E., Chmielewski, L., Oswald, D., & Schwabe, P. (2016). '''Attacking embedded ECC implementations through cmov side channels.''' ''IACR Cryptology ePrint Archive'', ''2016'', 923.
* Summary: This paper demonstrates that attacks that require only a single trace and directly target a conditional move (cmov) are indeed possible for ECC software running on AVR ATmega microcontrollers, using a protected version of the popular µNaCl library as an example.
* Usage: ChipWhisperer Software using ATmega328P 8-bit microcontroller placed on the ChipWhisperer hardware target board.
* [http://pure-oai.bham.ac.uk/ws/files/29531942/SAC_2016_paper.pdf PDF Link]
<br>

Navigation menu