{"667406":{"#nid":"667406","#data":{"type":"event","title":"Ph.D. Dissertation Defense - Anupam Golder","body":[{"value":"\u003Cp\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cstrong\u003E\u003Cspan\u003ETitle\u003C\/span\u003E\u003C\/strong\u003E\u003Cem\u003E\u003Cspan\u003E:\u0026nbsp; \u003C\/span\u003E\u003C\/em\u003E\u003Cem\u003E\u003Cspan\u003EPhysical Side-Channel Vulnerability Assessment of Implementations of Cryptographic Algorithms\u003C\/span\u003E\u003C\/em\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cstrong\u003E\u003Cspan\u003ECommittee:\u003C\/span\u003E\u003C\/strong\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003EDr. \u003C\/span\u003E\u003Cspan\u003EArijit Raychowdhury, ECE, Chair\u003C\/span\u003E\u003Cspan\u003E, Advisor \u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003EDr. \u003C\/span\u003E\u003Cspan\u003EJustin Romberg, ECE\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003EDr. \u003C\/span\u003E\u003Cspan\u003ESuman Datta, ECE\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003EDr. \u003C\/span\u003E\u003Cspan\u003EVisvesh Sathe, ECE\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003EDr. \u003C\/span\u003E\u003Cspan\u003EMathew Baker, Math\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003EDr. Sanu Mathew, Intel\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/p\u003E\r\n","summary":"","format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cp\u003EThe objective of the proposed research is to better analyze physical side-channel vulnerabilities, with a specific focus on the power and electromagnetic (EM) side-channels of both software and hardware implementations of cryptographic algorithms. First, we observed that, while performing the side-channel analysis (SCA) of such implementations, the existing body of works primarily focused on proposing better neural network (NN) models to achieve higher accuracy at recovering the secret information (i.e., key or message), which is why portability (profiling and attacking different devices) and interpretability (how the leakages are learned) issues of the NN models were largely overlooked. We demonstrated how this portability issue manifests in the NN-based power\/EM SCA on a software implementation of the current national institute of standards and technology (NIST) symmetric-key encryption standard, namely advanced encryption standard (AES). We proposed an efficient cross-device attack technique using multi-device training and pre-processing of traces under practical settings. Second, we investigated the interpretability of NN models used in SCA to gain insight into which features (i.e., points or time samples) contribute the most to the classification decision by validating the relevance scores of features from the NN models using gradient-based post hoc explanation methods to the ones obtained by traditional points-of-interest (PoI) selection methods. Third, we performed a power side-channel vulnerability assessment of a hardware implementation of one of the finalists of the NIST lightweight cryptography (LWC) competition, namely XOODYAK. We developed novel hypothetical attack models specific to the algorithm and demonstrated successful attacks on its INITIALIZE and ABSORB phases using correlation power analysis (CPA) and NN-based profiling techniques. Fourth, we demonstrated a single-trace profiling attack on a constant-time hardware implementation of cumulative distribution table (CDT)-based discrete Gaussian sampler used in lattice-based cryptography (LBC) algorithms which rely on the learning with errors (LWE) problem. Finally, we also developed generic mitigation strategies, such as a sensor to proactively detect an ongoing attack and signature attenuation techniques to reduce the signal-to-noise ratio (SNR) of side channel traces observable by an adversary to ensure implementation security against such attacks.\u003C\/p\u003E\r\n","format":"limited_html"}],"field_summary_sentence":[{"value":"Physical Side-Channel Vulnerability Assessment of Implementations of Cryptographic Algorithms "}],"uid":"28475","created_gmt":"2023-04-18 16:42:09","changed_gmt":"2023-04-20 20:28:10","author":"Daniela Staiculescu","boilerplate_text":"","field_publication":"","field_article_url":"","field_event_time":{"event_time_start":"2023-04-24T16:00:00-04:00","event_time_end":"2023-04-24T18:00:00-04:00","event_time_end_last":"2023-04-24T18:00:00-04:00","gmt_time_start":"2023-04-24 20:00:00","gmt_time_end":"2023-04-24 22:00:00","gmt_time_end_last":"2023-04-24 22:00:00","rrule":null,"timezone":"America\/New_York"},"location":"Online","extras":[],"related_links":[{"url":"https:\/\/teams.microsoft.com\/l\/meetup-join\/19%3ameeting_ZmFkYzE4YjktMjA4Zi00YWU4LWI3YjUtNmIzYjQxZTU4Nzk1%40thread.v2\/0?context=%7b%22Tid%22%3a%22482198bb-ae7b-4b25-8b7a-6d7f32faa083%22%2c%22Oid%22%3a%2246024958-7610-4d42-89d0-f7372a7a2f98%22%7d","title":"Microsoft Teams link"}],"groups":[{"id":"434381","name":"ECE Ph.D. Dissertation Defenses"}],"categories":[],"keywords":[{"id":"192484","name":"PhD Defense, graduate students"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[{"id":"1788","name":"Other\/Miscellaneous"}],"invited_audience":[{"id":"78771","name":"Public"}],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}}}