{"id":"https://openalex.org/W3115431586","doi":"https://doi.org/10.1109/apccas50809.2020.9301673","title":"Performance Analysis of Non-Profiled Side Channel Attacks Based on Convolutional Neural Networks","display_name":"Performance Analysis of Non-Profiled Side Channel Attacks Based on Convolutional Neural Networks","publication_year":2020,"publication_date":"2020-12-08","ids":{"openalex":"https://openalex.org/W3115431586","doi":"https://doi.org/10.1109/apccas50809.2020.9301673","mag":"3115431586"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/apccas50809.2020.9301673","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5088968161","display_name":"Ngoc\u2010Tuan Do","orcid":"https://orcid.org/0000-0002-9195-658X"},"institutions":[{"id":"https://openalex.org/I131359167","display_name":"Le Quy Don Technical University","ror":"https://ror.org/04wgyjv21","country_code":"VN","type":"education","lineage":["https://openalex.org/I131359167"]}],"countries":["VN"],"is_corresponding":false,"raw_author_name":"Ngoc-Tuan Do","raw_affiliation_strings":["Institute of System Integration, Le Quy Don Technical University, Hanoi, Vietnam"],"affiliations":[{"raw_affiliation_string":"Institute of System Integration, Le Quy Don Technical University, Hanoi, Vietnam","institution_ids":["https://openalex.org/I131359167"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082516246","display_name":"Van\u2010Phuc Hoang","orcid":"https://orcid.org/0000-0003-0944-8701"},"institutions":[{"id":"https://openalex.org/I131359167","display_name":"Le Quy Don Technical University","ror":"https://ror.org/04wgyjv21","country_code":"VN","type":"education","lineage":["https://openalex.org/I131359167"]}],"countries":["VN"],"is_corresponding":false,"raw_author_name":"Van-Phuc Hoang","raw_affiliation_strings":["Institute of System Integration, Le Quy Don Technical University, Hanoi, Vietnam"],"affiliations":[{"raw_affiliation_string":"Institute of System Integration, Le Quy Don Technical University, Hanoi, Vietnam","institution_ids":["https://openalex.org/I131359167"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5035179778","display_name":"Van\u2010Sang Doan","orcid":"https://orcid.org/0000-0001-9048-4341"},"institutions":[],"countries":["VN"],"is_corresponding":false,"raw_author_name":"Van-Sang Doan","raw_affiliation_strings":["Vietnam Naval Academy, Nha Trang, Vietnam"],"affiliations":[{"raw_affiliation_string":"Vietnam Naval Academy, Nha Trang, Vietnam","institution_ids":[]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.713,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.438836,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":85,"max":86},"biblio":{"volume":null,"issue":null,"first_page":"66","last_page":"69"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9991,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9969,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/power-analysis","display_name":"Power analysis","score":0.614972},{"id":"https://openalex.org/keywords/gaussian-noise","display_name":"Gaussian Noise","score":0.51058894}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8333193},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.80318403},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.7761537},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.73198235},{"id":"https://openalex.org/C71743495","wikidata":"https://www.wikidata.org/wiki/Q2845210","display_name":"Power analysis","level":3,"score":0.614972},{"id":"https://openalex.org/C99498987","wikidata":"https://www.wikidata.org/wiki/Q2210247","display_name":"Noise (video)","level":3,"score":0.61171365},{"id":"https://openalex.org/C4199805","wikidata":"https://www.wikidata.org/wiki/Q2725903","display_name":"Gaussian noise","level":2,"score":0.51058894},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.4725418},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.41983634},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.41971183},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.41964749},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.38489997},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3644086},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.34166914},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.2881865},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.12945229},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/apccas50809.2020.9301673","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[{"funder":"https://openalex.org/F4320314235","funder_display_name":"TED","award_id":null}],"datasets":[],"versions":[],"referenced_works_count":12,"referenced_works":["https://openalex.org/W1562542037","https://openalex.org/W1836465849","https://openalex.org/W2273396394","https://openalex.org/W2519091744","https://openalex.org/W2759450573","https://openalex.org/W2914572864","https://openalex.org/W2923594358","https://openalex.org/W2949382160","https://openalex.org/W29626722","https://openalex.org/W3184998487","https://openalex.org/W4251361495","https://openalex.org/W4289115712"],"related_works":["https://openalex.org/W5280335","https://openalex.org/W4384807855","https://openalex.org/W4323926098","https://openalex.org/W4244949874","https://openalex.org/W2782264121","https://openalex.org/W2425598453","https://openalex.org/W2164725015","https://openalex.org/W2125219685","https://openalex.org/W2022533428","https://openalex.org/W182679101"],"abstract_inverted_index":{"There":[0],"are":[1,14,126,131],"emerging":[2],"issues":[3,75],"about":[4],"side":[5],"channel":[6],"at-tacks":[7],"(SCAs)":[8],"on":[9,57,121,170],"the":[10,23,64,73,84,112,122,134,146,166],"cryptographic":[11,42,66],"devices":[12],"which":[13],"widely":[15],"used":[16],"today":[17],"for":[18,37,102,157],"securing":[19],"secret":[20],"information.":[21],"Recently,":[22],"neural":[24,54],"networks":[25,55],"have":[26],"been":[27],"introduced":[28],"as":[29],"a":[30,49,89,95,99,118,174],"new":[31],"promising":[32],"approach":[33],"to":[34,70,97],"perform":[35],"SCA":[36,51,81,115,149],"hardware":[38],"security":[39],"evaluation":[40],"of":[41,92,111,124],"algorithms.":[43],"In":[44],"this":[45],"work,":[46],"we":[47],"present":[48],"non-profiled":[50,158],"using":[52,83],"convolutional":[53],"(CNNs)":[56],"an":[58],"8-bit":[59],"AVR":[60],"micro-controller":[61],"device":[62],"running":[63],"AES-128":[65],"algorithm.":[67],"We":[68],"aim":[69],"point":[71],"out":[72],"practical":[74,108],"that":[76,145,165],"occurs":[77],"in":[78],"CNN":[79,103,113,147],"based":[80,114,148],"methods":[82,116],"aligned":[85],"power":[86,136,171],"traces":[87,137,172],"with":[88,133,150],"large":[90],"number":[91],"samples.":[93],"Furthermore,":[94],"method":[96],"build":[98],"suitable":[100],"dataset":[101,153],"training":[104],"is":[105,162],"introduced.":[106],"Especially,":[107],"experiment":[109],"results":[110,143,156],"and":[117,138],"comprehensive":[119],"investigation":[120],"effect":[123],"noise":[125,168],"also":[127,163],"presented.":[128],"These":[129],"experiments":[130],"performed":[132],"original":[135],"additive":[139],"Gaussian":[140,167],"noise.":[141],"The":[142],"show":[144],"our":[151],"constructed":[152],"provides":[154],"reliable":[155],"attacks.":[159],"However,":[160],"it":[161],"shown":[164],"added":[169],"becomes":[173],"serious":[175],"problem.":[176]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W3115431586","counts_by_year":[{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":5}],"updated_date":"2024-12-09T07:48:57.506818","created_date":"2021-01-05"}