Profiled Side-Channel Analysis in the Efficient Attacker Framework

Stjepan Picek*, Annelie Heuser, Guilherme Perin, Sylvain Guilley

*Corresponding author for this work

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

1 Citation (Scopus)


Profiled side-channel attacks represent the most powerful category of side-channel attacks. There, the attacker has access to a clone device to profile its leaking behavior. Additionally, it is common to consider the attacker unbounded in power to allow the worst-case security analysis. This paper starts with a different premise where we are interested in the minimum power that the attacker requires to conduct a successful attack. We propose a new framework for profiled side-channel analysis that we call the Efficient Attacker Framework. With it, we require attacks to be as powerful as possible, but we also provide a setting that inherently allows a more objective analysis among attacks. To confirm our theoretical results, we provide an experimental evaluation of our framework in the context of deep learning-based side-channel analysis.

Original languageEnglish
Title of host publicationSmart Card Research and Advanced Applications
Subtitle of host publication20th International Conference, CARDIS 2021, Revised Selected Papers
EditorsVincent Grosso, Thomas Pöppelmann
Place of PublicationCham
Number of pages20
ISBN (Electronic)978-3-030-97348-3
ISBN (Print)978-3-030-97347-6
Publication statusPublished - 2022
Event20th International Conference on Smart Card Research and Advanced Applications, CARDIS 2021 - Virtual, Online
Duration: 11 Nov 202112 Nov 2021

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349


Conference20th International Conference on Smart Card Research and Advanced Applications, CARDIS 2021
CityVirtual, Online

Bibliographical note

Accepted author manuscript


Dive into the research topics of 'Profiled Side-Channel Analysis in the Efficient Attacker Framework'. Together they form a unique fingerprint.

Cite this