Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Single-Trace Attack Using One-Shot Learning With Siamese Network in Non-Profiled Setting

Full metadata record
DC Field Value Language
dc.contributor.authorLee, Nayeon-
dc.contributor.authorHong, Seokhie-
dc.contributor.authorKim, Heeseok-
dc.date.accessioned2022-08-15T09:41:08Z-
dc.date.available2022-08-15T09:41:08Z-
dc.date.created2022-08-12-
dc.date.issued2022-
dc.identifier.issn2169-3536-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/143258-
dc.description.abstractRecently, many studies have shown that using deep learning for side-channel attacks offers several advantages, including simplification of the attack phase and target breaking, even in protected implementations, while presenting outstanding attack performance. Power and electromagnetic analysis, which is known as the most robust attack, can be classified into profiling and non-profiling attacks. In the real world, a non-profiling attack is more ideal than a profiling attack. In particular, studies on non-profiling attacks using deep learning for asymmetric cryptosystems are rare and have shortcomings, such as a long analysis time. In this paper, we propose a novel non-profiling attack method for asymmetric cryptosystems that requires only a single trace and a reasonably short attack time to recover a full private key, overcoming the limitations of previous studies. The proposed method applies one-shot learning with a convolutional Siamese network, which is used for the first time in side-channel attacks. Thus, our proposed method can leak private keys used in a protected public-key cryptosystem with up to 100% accuracy with only one single trace in a non-profiled setting.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherIEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC-
dc.titleSingle-Trace Attack Using One-Shot Learning With Siamese Network in Non-Profiled Setting-
dc.typeArticle-
dc.contributor.affiliatedAuthorHong, Seokhie-
dc.contributor.affiliatedAuthorKim, Heeseok-
dc.identifier.doi10.1109/ACCESS.2022.3180742-
dc.identifier.scopusid2-s2.0-85131727094-
dc.identifier.wosid000811539600001-
dc.identifier.bibliographicCitationIEEE ACCESS, v.10, pp.60778 - 60789-
dc.relation.isPartOfIEEE ACCESS-
dc.citation.titleIEEE ACCESS-
dc.citation.volume10-
dc.citation.startPage60778-
dc.citation.endPage60789-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.isOpenAccessY-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaEngineering-
dc.relation.journalResearchAreaTelecommunications-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryEngineering, Electrical & Electronic-
dc.relation.journalWebOfScienceCategoryTelecommunications-
dc.subject.keywordAuthorSide-channel attacks-
dc.subject.keywordAuthorDeep learning-
dc.subject.keywordAuthorTraining-
dc.subject.keywordAuthorTraining data-
dc.subject.keywordAuthorPrediction algorithms-
dc.subject.keywordAuthorNoise measurement-
dc.subject.keywordAuthorLicenses-
dc.subject.keywordAuthorDeep learning-
dc.subject.keywordAuthorECC-
dc.subject.keywordAuthorMontgomery ladder-
dc.subject.keywordAuthornon-profiling attack-
dc.subject.keywordAuthorone-shot learning-
dc.subject.keywordAuthorside channel attack-
dc.subject.keywordAuthorSiamese network-
dc.subject.keywordAuthorsimilarity score-
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles
Graduate School > Department of Cyber Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Hong, Seok hie photo

Hong, Seok hie
Department of Information Security
Read more

Altmetrics

Total Views & Downloads

BROWSE