An Automated End-to-End Side Channel Analysis Based on Probabilistic Model
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Hwang, Jeonghwan | - |
dc.contributor.author | Yoon, Ji Won | - |
dc.date.accessioned | 2021-08-31T05:18:58Z | - |
dc.date.available | 2021-08-31T05:18:58Z | - |
dc.date.created | 2021-06-18 | - |
dc.date.issued | 2020-04 | - |
dc.identifier.issn | 2076-3417 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/56869 | - |
dc.description.abstract | In this paper, we propose a new automated way to find out the secret exponent from a single power trace. We segment the power trace into subsignals that are directly related to recovery of the secret exponent. The proposed approach does not need the reference window to slide, templates nor correlation coefficients compared to previous manners. Our method detects change points in the power trace to explore the locations of the operations and is robust to unexpected noise addition. We first model the change point detection problem to catch the subsignals irrelevant to the secret and solve this problem with Markov Chain Monte Carlo (MCMC) which gives a global optimal solution. After separating the relevant and irrelevant parts in signal, we extract features from the segments and group segments into clusters to find the key exponent. Using single power trace indicates the weakest power level of attacker where there is a very slight chance of acquiring as many power traces as needed for breaking the key. We empirically show the improvement in accuracy even with presence of high level of noise. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | MDPI | - |
dc.subject | ATTACKS | - |
dc.title | An Automated End-to-End Side Channel Analysis Based on Probabilistic Model | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Yoon, Ji Won | - |
dc.identifier.doi | 10.3390/app10072369 | - |
dc.identifier.scopusid | 2-s2.0-85083580516 | - |
dc.identifier.wosid | 000533356200168 | - |
dc.identifier.bibliographicCitation | APPLIED SCIENCES-BASEL, v.10, no.7 | - |
dc.relation.isPartOf | APPLIED SCIENCES-BASEL | - |
dc.citation.title | APPLIED SCIENCES-BASEL | - |
dc.citation.volume | 10 | - |
dc.citation.number | 7 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Chemistry | - |
dc.relation.journalResearchArea | Engineering | - |
dc.relation.journalResearchArea | Materials Science | - |
dc.relation.journalResearchArea | Physics | - |
dc.relation.journalWebOfScienceCategory | Chemistry, Multidisciplinary | - |
dc.relation.journalWebOfScienceCategory | Engineering, Multidisciplinary | - |
dc.relation.journalWebOfScienceCategory | Materials Science, Multidisciplinary | - |
dc.relation.journalWebOfScienceCategory | Physics, Applied | - |
dc.subject.keywordPlus | ATTACKS | - |
dc.subject.keywordAuthor | side channel attack | - |
dc.subject.keywordAuthor | power analysis | - |
dc.subject.keywordAuthor | markov chain Monte Carlo | - |
dc.subject.keywordAuthor | change point detection | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
145 Anam-ro, Seongbuk-gu, Seoul, 02841, Korea+82-2-3290-2963
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.