Page 466 - 《软件学报》2026年第1期
P. 466

李迪 等: 复杂应用场景下侧信道分析的可移植性研究综述                                                      463


                     1007/978-3-642-15031-9_7]
                 [71]   Veyrat-Charvillon  N,  Medwed  M,  Kerckhof  S,  Standaert  FX.  Shuffling  against  side-channel  attacks:  A  comprehensive  study  with
                     cautionary  note.  In:  Proc.  of  the  2012  Int’l  Conf.  on  the  Theory  and  Application  of  Cryptology  and  Information  Security.  Beijing:
                     Springer, 2012. 740–757. [doi: 10.1007/978-3-642-34961-4_44]
                 [72]   Wolf S, Hu H, Cooley R, Borowczak M. Stealing machine learning parameters via side channel power attacks. In: Proc. of the 2021 IEEE
                     Computer Society Annual Symp. on VLSI (ISVLSI). Tampa: IEEE, 2021. 242–247. [doi: 10.1109/ISVLSI51109.2021.00052]
                 [73]   Mateos E, Gebotys CH. A new correlation frequency analysis of the side channel. In: Proc. of the 5th Workshop on Embedded Systems
                     Security. Scottsdale: ACM, 2010. 4. [doi: 10.1145/1873548.1873552]
                 [74]   Golder A, Das D, Danial J, Ghosh S, Sen S, Raychowdhury A. Practical approaches toward deep-learning-based cross-device power side-
                     channel  attack.  IEEE  Trans.  on  Very  Large  Scale  Integration  (VLSI)  Systems,  2019,  27(12):  2720–2733.  [doi:  10.1109/tvlsi.2019.
                     2926324]
                 [75]   Rioja U, Batina L, Armendariz I. When similarities among devices are taken for granted: Another look at portability. In: Proc. of the 2020
                     Int’l Conf. on Cryptology in Africa. Cairo: Springer, 2020. 337–357. [doi: 10.1007/978-3-030-51938-4_17]
                 [76]   Sudhan RH, Kumar MG, Prakash AU, Devi SAR, Sathiya P. Arduino ATMega-328 microcontroller. Int’l Journal of Innovative research
                     in Electrical, Electronics, Instrumentation and Control Engineering, 2015, 3(4): 27–29. [doi: 10.17148/ijireeice.2015.3406]
                 [77]   Weiss K, Khoshgoftaar TM, Wang DD. A survey of transfer learning. Journal of Big Data, 2016, 3(1): 9. [doi: 10.1186/s40537-016-0043-6]
                 [78]   Wang P, Chen P, Luo ZM, Dong GF, Zheng MC, Yu NH, Hu HG. Enhancing the performance of practical profiling side-channel attacks
                     using conditional generative adversarial networks. Cryptology ePrint Archive, Paper 2020/867, 2020. https://eprint.iacr.org/2020/867
                 [79]   Li D, Li L, Ou Y. Side-channel analysis based on Siamese neural network. The Journal of Supercomputing, 2024, 80(4): 4423–4450. [doi:
                     10.1007/s11227-023-05631-3]
                 [80]   Mukhtar N, Batina L, Picek S, Kong Y. Fake it till you make it: Data augmentation using generative adversarial networks for all the
                     crypto you need on small devices. In: Proc. of the 2022 Cryptographers’ Track at the RSA Conf. Springer, 2022. 297–321. [doi: 10.1007/
                     978-3-030-95312-6_13]
                 [81]   Ito A, Saito K, Ueno R, Homma N. Imbalanced data problems in deep learning-based side-channel attacks: Analysis and solution. IEEE
                     Trans. on Information Forensics and Security, 2021, 16: 3790–3802. [doi: 10.1109/tifs.2021.3092050]
                 [82]   Picek S, Heuser A, Perin G, Guilley S. Profiled side-channel analysis in the efficient attacker framework. In: Grosso V, Pöppelmann T,
                     eds. Proc. of the 20th Int’l Conf. on Smart Card Research and Advanced Applications. Lübeck: Springer, 2022. 44–63. [doi: 10.1007/978-
                     3-030-97348-3_3]
                 [83]   Genevey-Metat C, Heuser A, Gérard B. Train or adapt a deeply learned profile? In: Proc. of the 2021 Int’l Conf. on Cryptology and
                     Information Security in Latin America. Bogotá: Springer, 2021. 213–232. [doi: 10.1007/978-3-030-88238-9_11]
                 [84]   Jia XD, Zhao M, Di Y, Yang QB, Lee J. Assessment of data suitability for machine prognosis using maximum mean discrepancy. IEEE
                     Trans. on Industrial Electronics, 2018, 65(7): 5872–5881. [doi: 10.1109/tie.2017.2777383]
                 [85]   Guntur H, Ishii J, Satoh A. Side-channel attack user reference architecture board SAKURA-G. In: Proc. of the 3rd IEEE Global Conf. on
                     Consumer Electronics (GCCE). Tokyo: IEEE, 2014. 271–274. [doi: 10.1109/GCCE.2014.7031104]
                 [86]   Cao P, Zhang HY, Gu DW, Lu Y, Yuan YD. AL-PA: Cross-device profiled side-channel attack using adversarial learning. In: Proc. of the
                     59th ACM/IEEE Design Automation Conf. San Francisco: ACM, 2022. 691–696. [doi: 10.1145/3489517.3530517]

                 附中文参考文献
                 [41]   王安, 葛婧, 商宁, 张帆, 张国双. 侧信道分析实用案例概述. 密码学报, 2018, 5(4): 383–398. [doi: 10.13868/j.cnki.jcr.000249]
                 [42]   吴伟彬, 刘哲, 杨昊, 张吉鹏. 后量子密码算法的侧信道攻击与防御综述. 软件学报, 2021, 32(4): 1165–1185. http://www.jos.org.cn/
                     1000-9825/6165.htm [doi: 10.13328/j.cnki.jos.006165]
                 [43]   王永娟, 樊昊鹏, 代政一, 袁庆军, 王相宾. 侧信道攻击与防御技术研究进展. 计算机学报, 2023, 46(1): 202–228. [doi: 10.11897/SP.J.
                     1016.2023.00202]

                 作者简介
                 李迪, 博士生, CCF  学生会员, 主要研究领域为密码芯片功耗攻击与防御.
                 张裕鹏, 硕士, 主要研究领域为密码学应用.
                 汤宇锋, 博士, 主要研究领域为白盒密码的设计及其侧信道分析.
                 龚征, 博士, 教授, 主要研究领域为对称密码算法的设计与分析.
   461   462   463   464   465   466   467   468   469   470   471