NASCTY: Neuroevolution to Attack Side-channel Leakages Yielding Convolutional Neural Networks.
Fiske SchijlenLichao WuLuca MariotPublished in: CoRR (2023)
Keyphrases
- convolutional neural networks
- countermeasures
- power analysis
- secret key
- convolutional network
- artificial neural networks
- smart card
- information security
- malicious users
- database
- case study
- evolutionary algorithm
- ddos attacks
- cyber attacks
- block cipher
- denial of service attacks
- malicious attacks
- machine learning
- data mining