top | item 27242188

Deep-learning side-channel attacks: the theory

42 points| ebursztein | 4 years ago |elie.net | reply

2 comments

order
[+] aborsy|4 years ago|reply
Two questions.

1. You used unprotected AES implementations. Have you looked at how your attack works on modern crypto where power is nearly constant?

2. Power SCAs require an attacker controlling the plaintext and an oscilloscope to measure the output power. How realistic is this?

[+] ebursztein|4 years ago|reply
1. We did look at many implementations - protection is mostly masked AES rather than having "flattened power". It take us far more time, to get the datasets right and ready for sharing but hopefully we will get to release the papers and the datasets in not a too distance future.

2. If you go after a very valuable target, side-channels are very realistic. There are also more mainstream attacks like against game consoles but they were glitch or timing based afaik.