Intelligent machine homicide: Breaking cryptographic devices using support vector machines

145Citations
Citations of this article
25Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In this contribution we propose the so-called SVM attack, a profiling based side channel attack, which uses the machine learning algorithm support vector machines (SVM) in order to recover a cryptographic secret. We compare the SVM attack to the template attack by evaluating the number of required traces in the attack phase to achieve a fixed guessing entropy. In order to highlight the benefits of the SVM attack, we perform the comparison for power traces with a varying noise level and vary the size of the profiling base. Our experiments indicate that due to the generalization of SVM the SVM attack is able to recover the key using a smaller profiling base than the template attack. Thus, the SVM attack counters the main drawback of the template attack, i.e. a huge profiling base. © 2012 Springer-Verlag.

Cite

CITATION STYLE

APA

Heuser, A., & Zohner, M. (2012). Intelligent machine homicide: Breaking cryptographic devices using support vector machines. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 7275 LNCS, pp. 249–264). https://doi.org/10.1007/978-3-642-29912-4_18

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free