Abstract
Side-channel attacks are the class of attacks which exploits the physical leakages of the system to recover the secret key, based on the weakness induced due to implementation of algorithm on embedded systems. AES is mathematically secure but side-channel information can lead to key recovery. Over the last decade, machine learning has been introduced in parallel along with traditional statistical side-channel analysis methods. Accurate classification u sing t he machine-learning-based approaches critically depends on various factors including, precision of the input data-sets which consist of the features, tuning of different parameters for that particular algorithm, per feature sample length, number of validation folds and feature extraction/selection methods. For analysis of leaked signals in this study, hyper-parameter tuning is carried out on the feature data-sets formed on basis of the time and frequency domain properties of the signals. Results provide the comparative analysis of the best choices and leads to concrete selection of the parameters.
Original language | English |
---|---|
Title of host publication | 2018 IEEE ICSENG proceedings |
Place of Publication | Piscataway, NJ |
Publisher | Institute of Electrical and Electronics Engineers (IEEE) |
Pages | 1-7 |
Number of pages | 7 |
ISBN (Electronic) | 9781538678343, 9781538678336 |
ISBN (Print) | 9781538678350 |
DOIs | |
Publication status | Published - 2018 |
Event | 26th International Conference on Systems Engineering, ICSEng 2018 - Sydney, Australia Duration: 18 Dec 2018 → 20 Dec 2018 |
Conference
Conference | 26th International Conference on Systems Engineering, ICSEng 2018 |
---|---|
Country/Territory | Australia |
City | Sydney |
Period | 18/12/18 → 20/12/18 |