Page 466 - 《软件学报》2026年第1期
P. 466
李迪 等: 复杂应用场景下侧信道分析的可移植性研究综述 463
1007/978-3-642-15031-9_7]
[71] Veyrat-Charvillon N, Medwed M, Kerckhof S, Standaert FX. Shuffling against side-channel attacks: A comprehensive study with
cautionary note. In: Proc. of the 2012 Int’l Conf. on the Theory and Application of Cryptology and Information Security. Beijing:
Springer, 2012. 740–757. [doi: 10.1007/978-3-642-34961-4_44]
[72] Wolf S, Hu H, Cooley R, Borowczak M. Stealing machine learning parameters via side channel power attacks. In: Proc. of the 2021 IEEE
Computer Society Annual Symp. on VLSI (ISVLSI). Tampa: IEEE, 2021. 242–247. [doi: 10.1109/ISVLSI51109.2021.00052]
[73] Mateos E, Gebotys CH. A new correlation frequency analysis of the side channel. In: Proc. of the 5th Workshop on Embedded Systems
Security. Scottsdale: ACM, 2010. 4. [doi: 10.1145/1873548.1873552]
[74] Golder A, Das D, Danial J, Ghosh S, Sen S, Raychowdhury A. Practical approaches toward deep-learning-based cross-device power side-
channel attack. IEEE Trans. on Very Large Scale Integration (VLSI) Systems, 2019, 27(12): 2720–2733. [doi: 10.1109/tvlsi.2019.
2926324]
[75] Rioja U, Batina L, Armendariz I. When similarities among devices are taken for granted: Another look at portability. In: Proc. of the 2020
Int’l Conf. on Cryptology in Africa. Cairo: Springer, 2020. 337–357. [doi: 10.1007/978-3-030-51938-4_17]
[76] Sudhan RH, Kumar MG, Prakash AU, Devi SAR, Sathiya P. Arduino ATMega-328 microcontroller. Int’l Journal of Innovative research
in Electrical, Electronics, Instrumentation and Control Engineering, 2015, 3(4): 27–29. [doi: 10.17148/ijireeice.2015.3406]
[77] Weiss K, Khoshgoftaar TM, Wang DD. A survey of transfer learning. Journal of Big Data, 2016, 3(1): 9. [doi: 10.1186/s40537-016-0043-6]
[78] Wang P, Chen P, Luo ZM, Dong GF, Zheng MC, Yu NH, Hu HG. Enhancing the performance of practical profiling side-channel attacks
using conditional generative adversarial networks. Cryptology ePrint Archive, Paper 2020/867, 2020. https://eprint.iacr.org/2020/867
[79] Li D, Li L, Ou Y. Side-channel analysis based on Siamese neural network. The Journal of Supercomputing, 2024, 80(4): 4423–4450. [doi:
10.1007/s11227-023-05631-3]
[80] Mukhtar N, Batina L, Picek S, Kong Y. Fake it till you make it: Data augmentation using generative adversarial networks for all the
crypto you need on small devices. In: Proc. of the 2022 Cryptographers’ Track at the RSA Conf. Springer, 2022. 297–321. [doi: 10.1007/
978-3-030-95312-6_13]
[81] Ito A, Saito K, Ueno R, Homma N. Imbalanced data problems in deep learning-based side-channel attacks: Analysis and solution. IEEE
Trans. on Information Forensics and Security, 2021, 16: 3790–3802. [doi: 10.1109/tifs.2021.3092050]
[82] Picek S, Heuser A, Perin G, Guilley S. Profiled side-channel analysis in the efficient attacker framework. In: Grosso V, Pöppelmann T,
eds. Proc. of the 20th Int’l Conf. on Smart Card Research and Advanced Applications. Lübeck: Springer, 2022. 44–63. [doi: 10.1007/978-
3-030-97348-3_3]
[83] Genevey-Metat C, Heuser A, Gérard B. Train or adapt a deeply learned profile? In: Proc. of the 2021 Int’l Conf. on Cryptology and
Information Security in Latin America. Bogotá: Springer, 2021. 213–232. [doi: 10.1007/978-3-030-88238-9_11]
[84] Jia XD, Zhao M, Di Y, Yang QB, Lee J. Assessment of data suitability for machine prognosis using maximum mean discrepancy. IEEE
Trans. on Industrial Electronics, 2018, 65(7): 5872–5881. [doi: 10.1109/tie.2017.2777383]
[85] Guntur H, Ishii J, Satoh A. Side-channel attack user reference architecture board SAKURA-G. In: Proc. of the 3rd IEEE Global Conf. on
Consumer Electronics (GCCE). Tokyo: IEEE, 2014. 271–274. [doi: 10.1109/GCCE.2014.7031104]
[86] Cao P, Zhang HY, Gu DW, Lu Y, Yuan YD. AL-PA: Cross-device profiled side-channel attack using adversarial learning. In: Proc. of the
59th ACM/IEEE Design Automation Conf. San Francisco: ACM, 2022. 691–696. [doi: 10.1145/3489517.3530517]
附中文参考文献
[41] 王安, 葛婧, 商宁, 张帆, 张国双. 侧信道分析实用案例概述. 密码学报, 2018, 5(4): 383–398. [doi: 10.13868/j.cnki.jcr.000249]
[42] 吴伟彬, 刘哲, 杨昊, 张吉鹏. 后量子密码算法的侧信道攻击与防御综述. 软件学报, 2021, 32(4): 1165–1185. http://www.jos.org.cn/
1000-9825/6165.htm [doi: 10.13328/j.cnki.jos.006165]
[43] 王永娟, 樊昊鹏, 代政一, 袁庆军, 王相宾. 侧信道攻击与防御技术研究进展. 计算机学报, 2023, 46(1): 202–228. [doi: 10.11897/SP.J.
1016.2023.00202]
作者简介
李迪, 博士生, CCF 学生会员, 主要研究领域为密码芯片功耗攻击与防御.
张裕鹏, 硕士, 主要研究领域为密码学应用.
汤宇锋, 博士, 主要研究领域为白盒密码的设计及其侧信道分析.
龚征, 博士, 教授, 主要研究领域为对称密码算法的设计与分析.

