The myth of generic DPA... and the magic of learning

58Citations
Citations of this article
39Readers
Mendeley users who have this article in their library.
Get full text

Abstract

A generic DPA strategy is one which is able to recover secret information from physically observable device leakage without any a priori knowledge about the device's leakage characteristics. Here we provide much-needed clarification on results emerging from the existing literature, demonstrating precisely that such methods (strictly defined) are inherently restricted to a very limited selection of target functions. Continuing to search related techniques for a 'silver bullet' generic attack appears a bootless errand. However, we find that a minor relaxation of the strict definition-the incorporation of some minimal non-device-specific intuition-produces scope for generic-emulating strategies, able to succeed against a far wider range of targets. We present stepwise regression as an example of such, and demonstrate its effectiveness in a variety of scenarios. We also give some evidence that its practical performance matches that of 'best bit' DoM attacks which we take as further indication for the necessity of performing profiled attacks in the context of device evaluations. © 2014 Springer International Publishing.

Cite

CITATION STYLE

APA

Whitnall, C., Oswald, E., & Standaert, F. X. (2014). The myth of generic DPA... and the magic of learning. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 8366 LNCS, pp. 183–205). Springer Verlag. https://doi.org/10.1007/978-3-319-04852-9_10

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free