Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

EFFECTIVE FEATURE EXTRACTION METHOD FOR SVM-BASED PROFILED ATTACKS

Full metadata record
DC Field Value Language
dc.contributor.authorNgoc Quy Tran-
dc.contributor.authorHur, Junbeom-
dc.contributor.authorHieu Minh Nguyen-
dc.date.accessioned2022-05-18T00:42:09Z-
dc.date.available2022-05-18T00:42:09Z-
dc.date.created2022-05-17-
dc.date.issued2021-
dc.identifier.issn1335-9150-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/141189-
dc.description.abstractNowadays, one of the most powerful side channel attacks (SCA) is profiled attack. Machine learning algorithms, for example support vector machine, are currently used for improving the effectiveness of the attack. One issue when using SVM-based profiled attack is extracting points of interest, or features from power traces. So far, studies in SCA domain have selected the points of interest (POIs) from the raw power trace for the classifiers. Our work proposes a novel method for finding POIs that based on the combining variational mode decomposition (VMD) and Gram-Schmidt orthogonalization (GSO). That is, VMD is used to decompose the power traces into sub-signals (modes) of different frequencies and POIs selection process based on GSO is conducted on these sub-signals. As a result, the selected POIs are used for SVM classifier to conduct profiled attack. This attack method outperforms other profiled attacks in the same attack scenario. Experiments were performed on a trace data set collected from the Atmega8515 smart card run on the side channel evaluation board Sakura-G/W and the data set of DPA contest v4 to verify the effectiveness of our method in reducing number of power traces for the attacks, especially with noisy power traces.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherSLOVAK ACAD SCIENCES INST INFORMATICS-
dc.titleEFFECTIVE FEATURE EXTRACTION METHOD FOR SVM-BASED PROFILED ATTACKS-
dc.typeArticle-
dc.contributor.affiliatedAuthorHur, Junbeom-
dc.identifier.doi10.31577/cai_2021_5_1108-
dc.identifier.scopusid2-s2.0-85124475011-
dc.identifier.wosid000751537900007-
dc.identifier.bibliographicCitationCOMPUTING AND INFORMATICS, v.40, no.5, pp.1108 - 1135-
dc.relation.isPartOfCOMPUTING AND INFORMATICS-
dc.citation.titleCOMPUTING AND INFORMATICS-
dc.citation.volume40-
dc.citation.number5-
dc.citation.startPage1108-
dc.citation.endPage1135-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.isOpenAccessY-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalWebOfScienceCategoryComputer Science, Artificial Intelligence-
dc.subject.keywordAuthorPoints of interest-
dc.subject.keywordAuthorprofiled attack-
dc.subject.keywordAuthorside channel attack-
dc.subject.keywordAuthorsupport vector machine-
dc.subject.keywordAuthorvariational mode decomposition-
dc.subject.keywordAuthorGram-Schmidt orthogonalization-
Files in This Item
There are no files associated with this item.
Appears in
Collections
Graduate School > Department of Computer Science and Engineering > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetrics

Total Views & Downloads

BROWSE