Title
Non-profiled Mask Recovery: the impact of Independent Component Analysis.
Abstract
As one of the most prevalent SCA countermeasures, masking schemes are designed to defeat a broad range of side channel attacks. An attack vector that is suitable for low-order masking schemes is to try and directly determine the mask(s) (for each trace) by utilising the fact that often an attacker has access to several leakage points of the respectively used mask(s). Good examples for implementations of low-order masking schemes include the table re-computation schemes as well as the masking scheme in DPAContest V4.2. We propose a novel approach based on Independent Component Analysis (ICA) to efficiently utilise the information from several leakage points to reconstruct the respective masks (for each trace) and show it is a competitive attack vector in practice.
Year
Venue
Field
2018
IACR Cryptology ePrint Archive
Masking (art),Leakage (electronics),Computer science,Real-time computing,Implementation,Independent component analysis,Side channel attack,Computer engineering
DocType
Volume
Citations 
Journal
2018
0
PageRank 
References 
Authors
0.34
13
4
Name
Order
Citations
PageRank
Si Gao174.01
Elisabeth Oswald219717.67
Hua Chen300.34
Wei Xi439437.89