{"id":"https://openalex.org/W4390957255","doi":"https://doi.org/10.1109/mcsoc60832.2023.00010","title":"Revealing Secret Key from Low Success Rate Deep Learning-Based Side Channel Attacks","display_name":"Revealing Secret Key from Low Success Rate Deep Learning-Based Side Channel Attacks","publication_year":2023,"publication_date":"2023-12-18","ids":{"openalex":"https://openalex.org/W4390957255","doi":"https://doi.org/10.1109/mcsoc60832.2023.00010"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/mcsoc60832.2023.00010","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5082516246","display_name":"Van\u2010Phuc Hoang","orcid":"https://orcid.org/0000-0003-0944-8701"},"institutions":[{"id":"https://openalex.org/I131359167","display_name":"Le Quy Don Technical University","ror":"https://ror.org/04wgyjv21","country_code":"VN","type":"education","lineage":["https://openalex.org/I131359167"]}],"countries":["VN"],"is_corresponding":false,"raw_author_name":"Van-Phuc Hoang","raw_affiliation_strings":["Institute of System Integration, Le Quy Don Technical University, Hanoi, Vietnam"],"affiliations":[{"raw_affiliation_string":"Institute of System Integration, Le Quy Don Technical University, Hanoi, Vietnam","institution_ids":["https://openalex.org/I131359167"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088968161","display_name":"Ngoc\u2010Tuan Do","orcid":"https://orcid.org/0000-0002-9195-658X"},"institutions":[{"id":"https://openalex.org/I131359167","display_name":"Le Quy Don Technical University","ror":"https://ror.org/04wgyjv21","country_code":"VN","type":"education","lineage":["https://openalex.org/I131359167"]},{"id":"https://openalex.org/I12450925","display_name":"Nha Trang University","ror":"https://ror.org/047van922","country_code":"VN","type":"education","lineage":["https://openalex.org/I12450925"]}],"countries":["VN"],"is_corresponding":false,"raw_author_name":"Ngoc-Tuan Do","raw_affiliation_strings":["Institute of System Integration, Le Quy Don Technical University, Hanoi, Vietnam","Telecommunications University, Nha Trang, Vietnam"],"affiliations":[{"raw_affiliation_string":"Institute of System Integration, Le Quy Don Technical University, Hanoi, Vietnam","institution_ids":["https://openalex.org/I131359167"]},{"raw_affiliation_string":"Telecommunications University, Nha Trang, Vietnam","institution_ids":["https://openalex.org/I12450925"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025387024","display_name":"Trong-Thuc Hoang","orcid":"https://orcid.org/0000-0002-4078-0836"},"institutions":[{"id":"https://openalex.org/I20529979","display_name":"University of Electro-Communications","ror":"https://ror.org/02x73b849","country_code":"JP","type":"education","lineage":["https://openalex.org/I20529979"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Trong-Thuc Hoang","raw_affiliation_strings":["The University of Electro-Communications, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"The University of Electro-Communications, Tokyo, Japan","institution_ids":["https://openalex.org/I20529979"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5042912660","display_name":"Cong\u2010Kha Pham","orcid":"https://orcid.org/0000-0001-5255-4919"},"institutions":[{"id":"https://openalex.org/I20529979","display_name":"University of Electro-Communications","ror":"https://ror.org/02x73b849","country_code":"JP","type":"education","lineage":["https://openalex.org/I20529979"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Cong-Kha Pham","raw_affiliation_strings":["The University of Electro-Communications, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"The University of Electro-Communications, Tokyo, Japan","institution_ids":["https://openalex.org/I20529979"]}]}],"institution_assertions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.0,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":0,"max":67},"biblio":{"volume":null,"issue":null,"first_page":"9","last_page":"14"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9942,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.993,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/client-side","display_name":"Client-side","score":0.44196394}],"concepts":[{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.8869457},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.667505},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.643131},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.48929355},{"id":"https://openalex.org/C202477664","wikidata":"https://www.wikidata.org/wiki/Q1352449","display_name":"Client-side","level":2,"score":0.44196394},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.43161672},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.34817708},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.24002331}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/mcsoc60832.2023.00010","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":8,"referenced_works":["https://openalex.org/W2990296674","https://openalex.org/W3196768397","https://openalex.org/W4206230818","https://openalex.org/W4251361495","https://openalex.org/W4303427124","https://openalex.org/W4312904563","https://openalex.org/W4313465622","https://openalex.org/W4362555099"],"related_works":["https://openalex.org/W4402156186","https://openalex.org/W4302890120","https://openalex.org/W4288264855","https://openalex.org/W3180573957","https://openalex.org/W3006344745","https://openalex.org/W2162805750","https://openalex.org/W2103519941","https://openalex.org/W2043669269","https://openalex.org/W1968560271","https://openalex.org/W182679101"],"abstract_inverted_index":{"Non-profiled":[0],"deep":[1,7],"learning-based":[2],"side":[3,56],"channel":[4,57],"attacks":[5,17,32,164],"utilize":[6],"neural":[8],"networks":[9],"to":[10,22,51,119,162,185],"extract":[11],"highly":[12],"accurate":[13],"sensitive":[14],"information.":[15],"These":[16],"pose":[18],"a":[19,106,172],"significant":[20],"threat":[21],"the":[23,39,63,69,80,84,93,99,111,121,131,136,141,150,166,176],"security":[24],"of":[25,38,65,102,113,123,178],"cryptographic":[26,66],"devices.":[27],"Unlike":[28],"profiled":[29],"attacks,":[30],"non-profiled":[31,75,103],"do":[33],"not":[34,78,89],"require":[35],"prior":[36],"knowledge":[37],"target":[40],"device,":[41],"making":[42],"them":[43],"more":[44],"versatile.":[45],"Deep":[46],"learning":[47],"algorithms":[48],"enable":[49],"attackers":[50],"learn":[52],"complex":[53],"relationships":[54],"between":[55],"signals":[58],"and":[59,159],"secret":[60,81,137],"information,":[61],"enabling":[62],"recovery":[64],"keys,":[67],"even":[68,139],"common":[70],"SCA":[71],"countermeasure":[72],"deployed.":[73],"However,":[74],"DLSCA":[76],"can":[77],"reveal":[79,135],"key":[82],"if":[83,140],"correct":[85],"key's":[86],"metric":[87,108,161],"is":[88,117,146,171],"clearly":[90],"distinguished":[91],"from":[92,183],"incorrect":[94],"candidates.":[95],"This":[96],"paper":[97],"discusses":[98],"mentioned":[100],"issue":[101],"DLSCA.":[104],"Then,":[105],"new":[107],"based":[109],"on":[110,165],"inversion":[112],"exponential":[114],"rank":[115],"(IER)":[116],"proposed":[118,132],"enhance":[120],"performance":[122],"these":[124],"attacks.":[125],"The":[126],"experimental":[127],"results":[128],"show":[129],"that":[130],"technique":[133],"could":[134],"subkey":[138],"partial":[142],"success":[143],"rate":[144],"percentage":[145,177],"only":[147],"10%":[148],"in":[149,175],"ASCAD":[151],"dataset.":[152],"Furthermore,":[153],"when":[154],"utilizing":[155],"minimally":[156],"tuned":[157],"models":[158],"IER":[160],"execute":[163],"CHES-CTF":[167],"2018":[168],"data,":[169],"there":[170],"substantial":[173],"increase":[174],"correctly":[179],"revealed":[180],"bytes,":[181],"rising":[182],"62.5%":[184],"93.75%.":[186]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W4390957255","counts_by_year":[],"updated_date":"2025-01-02T09:41:40.771231","created_date":"2024-01-18"}