Please use this identifier to cite or link to this item: https://hdl.handle.net/10356/166560
Full metadata record
DC FieldValueLanguage
dc.contributor.authorLiu, Huanjiaen_US
dc.date.accessioned2023-05-03T03:03:50Z-
dc.date.available2023-05-03T03:03:50Z-
dc.date.issued2023-
dc.identifier.citationLiu, H. (2023). Machine-learning-based side-channel-attack on cryptographic devices. Master's thesis, Nanyang Technological University, Singapore. https://hdl.handle.net/10356/166560en_US
dc.identifier.urihttps://hdl.handle.net/10356/166560-
dc.description.abstractCorrelation Optimization with Deep Learning Analysis (CO-DLA) has played a significant role in non-profiling Side-channel Attacks (SCA). Currently, the deep learning architecture applied to SCA is mainly Convolutional Neural Networks (CNN), which is used in CO-DLA to build a CNN based CO-DLA (CNN-CO- DLA). It has an outstanding performance in SCA, but the lack of preprocessing still limits its attack efficiency. In this dissertation, we propose an improved CO- DLA using preprocessing technique Wavelet Scattering Transform (WST), termed as WST-based CO-DLA (WST-CO-DLA). WST-CO-DLA utilizes the training-free WST as a preprocessing step to extract the time-frequency features for CO-DLA. With the help of WST, the number of traces required to attack the datasets with mainstream countermeasures is significantly reduced. When the WST extracts information from time domain, windows with various sizes are employed for feature extraction. The various sizes of the WST windows are capable of extracting features associated with different frequency components from different locations of the raw traces. This makes WST resistant to small deformation carried naturally by leakage trace, resulting in better attack efficacy in machine-learning-based non-profiling SCA. In our experiment, the proposed WST-CO-DLA requires 20%, 33%, and 20% lesser traces to reveal the secret key from the unprotected, random delay, and random masked dataset, respectively, as compared to the reported CNN-CO-DLA.en_US
dc.language.isoenen_US
dc.publisherNanyang Technological Universityen_US
dc.subjectEngineering::Electrical and electronic engineeringen_US
dc.titleMachine-learning-based side-channel-attack on cryptographic devicesen_US
dc.typeThesis-Master by Courseworken_US
dc.contributor.supervisorGwee Bah Hweeen_US
dc.contributor.schoolSchool of Electrical and Electronic Engineeringen_US
dc.description.degreeMaster of Science (Integrated Circuit Design)en_US
dc.contributor.researchCentre for Integrated Circuits and Systemsen_US
dc.contributor.supervisoremailebhgwee@ntu.edu.sgen_US
item.fulltextWith Fulltext-
item.grantfulltextrestricted-
Appears in Collections:EEE Theses
Files in This Item:
File Description SizeFormat 
Huanjia.pdf
  Restricted Access
2.76 MBAdobe PDFView/Open

Page view(s)

176
Updated on Jun 19, 2024

Download(s)

3
Updated on Jun 19, 2024

Google ScholarTM

Check

Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.