Till innehåll på sidan
Till KTH:s startsida Till KTH:s startsida

Sårbarheter och hotanalys från sidokanaler med maskininlärning i fokus

Under det senaste decenniet har cyberattacker flyttat från att existera högt upp i programvarustacken till att även appliceras på den underliggande fysiska implementeringen. Trots det växande erkännandet av problemet finns det inga allmänna lösningar för att säkra de fysiska enheter som för närvarande är i användning.

Publikationer

 L. Backlund, K. Ngo, J. Gärtner, and E. Dubrova, "Secret Key Recovery Attack on Masked and Shuffled Implementations of CRYSTALS-Kyber and Saber". In: Zhou, J., et al. Applied Cryptography and Network Security Workshops. ACNS 2023. Lecture Notes in Computer Science, vol 13907. Springer, Cham, doi: 10.1007/978-3-031-41181-6_9

E. Dubrova, K. Ngo, J. Gärtner, and R. Wang, "Breaking a Fifth-Order Masked Implementation of CRYSTALS-Kyber by Copy-Paste", in Proceedings of the 10th ACM Asia Public-Key Cryptography Workshop, Melbourne, Australia, 2023, pp. 10-20, doi: 10.1145/3591866.3593072

 K. Ngo, and E. Dubrova, "Side-Channel Analysis of the Random Number Generator in STM32 MCUs," Proceedings of the Great Lakes Symposium on VLSI 2022, doi: 10.1145/3526241.3530324

K. Ngo, R. Wang, E. Dubrova, and N. Paulsrud, "Side-channel attacks on lattice-based KEMs are not prevented byhigher-order masking," Cryptology ePrint Archive

R. Wang, K. Ngo, and E. Dubrova, "A message recovery attack on LWE/LWR-based PKE/KEMs using amplitude modulated EM emanations," 25th Annual International Conference on Information Security and Cryptology.

R. Wang, K. Ngo, and E. Dubrova, "Side-channel analysis of Saber KEM using amplitude-modulated EM emanations,"  Euromicro Conference on Digital Systems Design 2022.

R. Wang, K. Ngo, and E. Dubrova, "Making biased DL models work: Message and key recovery attacks on saber using amplitude-modulated EM emanations," Cryptology ePint Archive

K. Ngo, E. Dubrova, and T. Johansson, "Breaking masked and shuffled CCA secure Saber KEM by power analysis," in Proceedings of the 5th Workshop on Attacks and Solutions in Hardware Security 2021, doi: 10.1145/3474376.3487277

K. Ngo, E. Dubrova, Q. Guo, and T. Johansson, “A Side-Channel Attack on a Masked IND-CCA Secure Saber KEM Implementation”, IACR Transactions on Cryptographic Hardware and Embedded Systems, 2021(4), 676–707. doi: 10.46586/tches.v2021.i4.676-707

Forskare