SOTAVerified

Side Channel Analysis

Papers

Showing 125 of 28 papers

TitleStatusHype
What Was Your Prompt? A Remote Keylogging Attack on AI AssistantsCode2
Side-channel analysis against ANSSI’s protected AES implementation on ARM: end-to-end attacks with multi-task learningCode2
Deep learning for side-channel analysis and introduction to ASCAD databaseCode1
Automated Side Channel Analysis of Media Software with Manifold LearningCode1
A Review of Confidentiality Threats Against Embedded Neural Network Models0
CNN architecture extraction on edge GPU0
Configuration and Collection Factors for Side-Channel Disassembly0
Crossed-IoT device portability of Electromagnetic Side Channel Analysis: Challenges and Dataset0
Efficient Bound for Conditional Min-Entropy of Physical Unclonable Functions Beyond IID0
Encoding Power Traces as Images for Efficient Side-Channel Analysis0
Evasive Hardware Trojan through Adversarial Power Trace0
Impedance vs. Power Side-channel Vulnerabilities: A Comparative Study0
A Desynchronization-Based Countermeasure Against Side-Channel Analysis of Neural Networks0
It's Not Just a Phase: On Investigating Phase Transitions in Deep Learning-based Side-channel Analysis0
MaskedNet: The First Hardware Inference Engine Aiming Power Side-Channel Protection0
NASCTY: Neuroevolution to Attack Side-channel Leakages Yielding Convolutional Neural Networks0
Physical Side-Channel Attacks on Embedded Neural Networks: A Survey0
Playing with blocks: Toward re-usable deep learning models for side-channel profiled attacks0
Revealing CNN Architectures via Side-Channel Analysis in Dataflow-based Inference Accelerators0
Improving Location-based Thermal Emission Side-Channel Analysis Using Iterative Transfer Learning0
Application Inference using Machine Learning based Side Channel Analysis0
A Practical Introduction to Side-Channel Extraction of Deep Neural Network Parameters0
A Review and Comparison of AI Enhanced Side Channel Analysis0
SNOW-SCA: ML-assisted Side-Channel Attack on SNOW-V0
TrojanWhisper: Evaluating Pre-trained LLMs to Detect and Localize Hardware Trojans0
Show:102550
← PrevPage 1 of 2Next →

No leaderboard results yet.