1. We did look at many implementations - protection is mostly masked AES rather than having "flattened power". It take us far more time, to get the datasets right and ready for sharing but hopefully we will get to release the papers and the datasets in not a too distance future.
2. If you go after a very valuable target, side-channels are very realistic. There are also more mainstream attacks like against game consoles but they were glitch or timing based afaik.
[+] [-] aborsy|4 years ago|reply
1. You used unprotected AES implementations. Have you looked at how your attack works on modern crypto where power is nearly constant?
2. Power SCAs require an attacker controlling the plaintext and an oscilloscope to measure the output power. How realistic is this?
[+] [-] ebursztein|4 years ago|reply
2. If you go after a very valuable target, side-channels are very realistic. There are also more mainstream attacks like against game consoles but they were glitch or timing based afaik.