Side-Channel Vulnerability and Threat Analysis with Machine Learning in Focus
For the past decade, cyber attacks have moved from high up in the software stack to the underlying physical implementation, the hardware. Despite growing recognition of the issue, there are no common solutions for assuring physical devices currently in wide use.
K. Ngo, and E. Dubrova, "Side-Channel Analysis of the Random Number Generator in STM32 MCUs," in Proceedings of the Great Lakes Symposium on VLSI 2022, doi: 10.1145/3526241.3530324
K. Ngo, R. Wang, E. Dubrova, and N. Paulsrud, "Side-channel attacks on lattice-based KEMs are not prevented byhigher-order masking," Cryptology ePrint Archive
R. Wang, K. Ngo, and E. Dubrova, "A message recovery attack on LWE/LWR-based PKE/KEMs using amplitude modulated EM emanations," 25th Annual International Conference on Information Security and Cryptology.
R. Wang, K. Ngo, and E. Dubrova, "Side-channel analysis of Saber KEM using amplitude-modulated EM emanations," Euromicro Conference on Digital Systems Design 2022.
R. Wang, K. Ngo, and E. Dubrova, "Making biased DL models work: Message and key recovery attacks on saber using amplitude-modulated EM emanations," Cryptology ePint Archive
K. Ngo, E. Dubrova, and T. Johansson, "Breaking masked and shuffled CCA secure Saber KEM by power analysis," in Proceedings of the 5th Workshop on Attacks and Solutions in Hardware Security 2021, doi: 10.1145/3474376.3487277
K. Ngo, E. Dubrova, Q. Guo, and T. Johansson, “A Side-Channel Attack on a Masked IND-CCA Secure Saber KEM Implementation”, IACR Transactions on Cryptographic Hardware and Embedded Systems, 2021(4), 676–707. doi: 10.46586/tches.v2021.i4.676-707