par Lerman, Liran ;Markowitch, Olivier ;Bontempi, Gianluca ;Ben Taieb, Souhaib
Référence Lecture notes in computer science, 8204, page (75-94)
Publication Publié, 2013
Article révisé par les pairs
Résumé : The goal of a profiling attack is to challenge the security of a cryptographic device in the worst case scenario. Though template attack is reputed as the strongest power analysis attack, they effectiveness is strongly dependent on the validity of the Gaussian assumption. This led recently to the appearance of nonparametric approaches, often based on machine learning strategies. Though these approaches outperform template attack, they tend to neglect the potential source of information available in the temporal dependencies between power values. In this paper, we propose an original multi-class profiling attack that takes into account the temporal dependence of power traces. The experimental study shows that the time series analysis approach is competitive and often better than static classification alternatives. © 2013 Springer-Verlag.