侧信道攻击对抗措施总结与实现
总结了侧信道攻击中常见的对抗措施,写入mlscat库,给了使用demo,在实际测试中可以直接调用来进行消融实验。
文献阅读笔记-The Need for Speed: A Fast Guessing Entropy Calculation for Deep Learning-Based SCA
一篇通过快速计算猜测熵来完成ES(early stopping)的工作
文献阅读笔记-Remove Some Noise: On Pre-processing of Side-channel Measurements with Autoencoders
文章信息
作者:Lichao Wu and Stjepan Picek
单位:Delft University of Technology, The Netherlands
出处:IACR Transactions on Cryptographic Hardware and Embedded Systems,
标题:Remove Some Noise: On Pre-processing of Side-channel Measurements with Autoencoders
文章代码:https://github.com/AISyLab/Denoising-autoencoder
研究问题
在侧信道攻击中的对抗措施是否可以被视为噪声,利用自编码器对其进行降噪处理来提高模型攻击成功率。
卷积自编码器可以做,可以尝试VAE、VQ-XXX、DAE等看效果,套到一个新方法上堆叠论文 ...
从零开始的Kaggle之旅
EDA技巧总结(不包括比赛记录
训练检查清单
训练检查清单(自用
每次模型的训练或多或少都会出问题,有时候猜测熵不收敛并不是模型的问题,好好检查训练的代码。
数据集
读取数据集, shape、head都需要print,首先check数据集是否正确
每次操作数据集之后:最好都check
文献阅读笔记-Cross-Device Profiled Side-Channel Attack with Unsupervised Domain Adaptation
f489e073913c83118513ae835244118e0f11c7735e9aaae4a8a95d8b023a2670cf0f5ef71fd93dea343885fa8665a2b92b495f76bb1778e4a05fb03e2225a2f811df5cbbd0f3a0222cb550ea28e03e68f3de4d80beb7c2c2c516b4b1e6f45bc14e865b03158f933d7d027901730624720112a44c1b9bc17ec008344fbdd5ba76a8989dac2813ef6528b35c4120a7f1f1f0f4b6d3238ce4fffd46ecc788be641031b604a04d4bc05085406222d3d53e198e54a8cdd708e73c72af128cba5dc1ba949d80a049fc3 ...
文献阅读笔记-The Best of Two Worlds: Deep Learning-assisted Template Attack
文章信息
作者:Lichao Wu, Guilherme Perin and Stjepan Picek
单位:Radboud University, The Netherlands; Delft University of Technology, The Netherlands
出处:IACR Transactions on Cryptographic Hardware and Embedded Systems
标题:The Best of Two Worlds: Deep Learning-assisted Template Attack
文章代码链接
最近开题,开完无缝衔接流感,服啦!
文章内容
作者提出了基于相似性学习的特征提取方法, 使用三元组模型来实现;提出一种新的mertic来提高提取的特征质量
相似性学习(Similarity Learning)
相似性学习属于 ...
文献阅读笔记-To Overfit, Or Not to Overfit: Improving the Performance of Deep Learning-based SCA
文章信息
作者:Azade Rezaeezade, Guilherme Perin, and Stjepan Picek
单位:Radboud University, The Netherlands; Delft University of Technology, The Netherlands
出处:[International Conference on Cryptology in Africa](https://link.springer.com/conference/africacrypt africacrypt) AFRICACRYPT 2022: Progress in Cryptology - AFRICACRYPT 2022 pp 397–421
标题:To Overfit, Or Not to Overfit: Improving the Perform ...