The recent improvements in deep learning (DL) have reshaped the state of the art of side-channel attacks (SCA) in the field of embedded security. Yet, their ``black-box'' aspect nowadays prevents the identification of the vulnerabilities exploited by such adversaries. Likewise, it is hard to conclude from the outcomes of these attacks about the security level of the target device. All those reasons have made the SCA community skeptical about the interest of such attack techniques in terms of security evaluation. This thesis proposes to draw a better understanding of deep learning for SCA. We show how the training of such estimators can be analyzed through the security evaluation prism, in order to estimate a priori the complexity of an SCA,...
In recent years, deep learning has become an attractive ingredient to side-channel analysis (SCA) du...
The security of modern embedded systems has been the subject of intensive research in engineering ar...
Masked cryptographic implementations can be vulnerable to higher-order attacks. For instance, deep ...
The recent improvements in deep learning (DL) have reshaped the state of the art of side-channel att...
Through this thesis, supervised by the Hubert-Curien Laboratory and the Thales ITSEF, we look for ge...
A side-channel attack (SCA) recovers secret data from a device by exploiting unintended physical lea...
Nowadays, embedded systems are more numerous and widespread in the real world. These systems are vul...
Recently, several studies have been published on the application of deep learning to enhance Side-Ch...
Deep Learning has recently been introduced as a new alternative to perform Side-Channel analysis [MP...
Over the last decades, side-channel attacks (SCAs) have been proven as a substantial weakness of cry...
In recent years, deep learning has become an attractive ingredient to side-channel analysis (SCA) du...
International audienceThe use of deep learning techniques to perform side-channel analysis attracted...
Side-channel attacks (SCA) aim to extract a secret cryptographic key from a device, based on uninten...
In recent years, deep learning has become an attractive ingredient to side-channel analysis (SCA) du...
The security of modern embedded systems has been the subject of intensive research in engineering ar...
Masked cryptographic implementations can be vulnerable to higher-order attacks. For instance, deep ...
The recent improvements in deep learning (DL) have reshaped the state of the art of side-channel att...
Through this thesis, supervised by the Hubert-Curien Laboratory and the Thales ITSEF, we look for ge...
A side-channel attack (SCA) recovers secret data from a device by exploiting unintended physical lea...
Nowadays, embedded systems are more numerous and widespread in the real world. These systems are vul...
Recently, several studies have been published on the application of deep learning to enhance Side-Ch...
Deep Learning has recently been introduced as a new alternative to perform Side-Channel analysis [MP...
Over the last decades, side-channel attacks (SCAs) have been proven as a substantial weakness of cry...
In recent years, deep learning has become an attractive ingredient to side-channel analysis (SCA) du...
International audienceThe use of deep learning techniques to perform side-channel analysis attracted...
Side-channel attacks (SCA) aim to extract a secret cryptographic key from a device, based on uninten...
In recent years, deep learning has become an attractive ingredient to side-channel analysis (SCA) du...
The security of modern embedded systems has been the subject of intensive research in engineering ar...
Masked cryptographic implementations can be vulnerable to higher-order attacks. For instance, deep ...