Access the full text.
Sign up today, get DeepDyve free for 14 days.
WJ McGill (1954)
Multivariate information transmissionTrans. IRE Prof. Group Inf. Theory (TIT), 4
E Prouff, M Rivain, R Bevan (2009)
Statistical analysis of second order differential power analysisIEEE Trans. Comput., 58
A Getis (1995)
Cliff, ad and ord, jk 1973: Spatial autocorrelation. london: PionProgress Hum. Geogr., 19
E Ronen, A Shamir, A-O Weingarten, C O’Flynn (2018)
IoT goes nuclear: creating a ZigBee chain reactionIEEE Secur. Priv., 16
J Doget, E Prouff, M Rivain, F-X Standaert (2011)
Univariate side channel attacks and leakage modelingJ. Cryptogr. Eng., 1
PAP Moran (1950)
Notes on continuous stochastic phenomenaBiometrika, 37
L Batina, B Gierlichs, E Prouff, M Rivain, F-X Standaert, N Veyrat-Charvillon (2011)
Mutual information analysis: a comprehensive studyJ. Cryptol., 24
D Genkin, I Pipman, E Tromer (2015)
Get your hands off my laptop: physical side-channel key-extraction attacks on PCs?extended versionJ. Cryptogr. Eng., 5
F Wilde, BM Gammel, M Pehl (2018)
Spatial correlation analysis on physical unclonable functionsIEEE Trans. Inf. Forensics Secur., 13
Practical side-channel attacks on recent devices may be challenging due to the poor quality of acquired signals. It can originate from different factors, such as the growing architecture complexity, especially in System-on-Chips, creating unpredictable and concurrent operation of multiple signal sources in the device. This work makes use of mixture distributions to formalize this complexity, allowing us to explain the benefit of using a technique like Scatter, where different samples of the traces are aggregated into the same distribution. Some observations of the conditional mixture distributions are made in order to model the leakage in such context. From this, we infer local coherency of information held in the distribution as a general expression of the leakage in mixture distributions. This leads us to introduce how spatial analysis tools, such as Moran’s Index, can be used to significantly improve non-profiled attacks compared to other techniques from the state-of-the-art. Exploitation of this technique is experimentally shown very promising, as demonstrated by its application on two AES implementations including masking and shuffling countermeasures.
Journal of Cryptographic Engineering – Springer Journals
Published: Nov 1, 2023
Keywords: Side-channel analysis; System-on-chips; Mixture distribution; Interaction information; Spatial analysis; Moran’s index; ASCAD
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.