Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Liran Lerman is active.

Publication


Featured researches published by Liran Lerman.


International Journal of Applied Cryptography | 2014

Power analysis attack: an approach based on machine learning

Liran Lerman; Gianluca Bontempi; Olivier Markowitch

In cryptography, a side-channel attack is any attack based on the analysis of measurements related to the physical implementation of a cryptosystem. Nowadays, the possibility of collecting a large amount of observations paves the way to the adoption of machine learning techniques, i.e., techniques able to extract information and patterns from large datasets. The use of statistical techniques for side-channel attacks is not new. Techniques like the template attack have shown their effectiveness in recent years. However, these techniques rely on parametric assumptions and are often limited to small dimensionality settings, which limit their range of application. This paper explores the use of machine learning techniques to relax such assumptions and to deal with high dimensional feature vectors.


smart card research and advanced application conference | 2013

A Machine Learning Approach Against a Masked AES

Liran Lerman; Stephane Fernandes Medeiros; Gianluca Bontempi; Olivier Markowitch

Side-channel attacks challenge the security of cryptographic devices. One of the widespread countermeasures against these attacks is the masking approach. In 2012, Nassar et al. [21] presented a new lightweight (low-cost) Boolean masking countermeasure to protect the implementation of the AES block-cipher. This masking scheme represents the target algorithm of the DPAContest V4 [30]. In this article, we present the first machine learning attack against a masking countermeasure, using the dataset of the DPAContest V4. We succeeded to extract each targeted byte of the key of the masked AES with \(26\) traces during the attacking phase. This number of traces represents roughly twice the number of traces needed compared to an unmasked AES on the same cryptographic device. Finally, we compared our proposal to a stochastic attack and to a strategy based on template attack. We showed that an attack based on a machine learning model reduces the number of traces required during the attacking step with a factor two and four compared respectively to template attack and to stochastic attack when analyzing the same leakage information. A new strategy based on stochastic attack reduces this number to 27.8 traces (in average) during the attack but requires a larger execution time in our setting than a learning model.


international workshop constructive side channel analysis and secure design | 2015

Template Attacks vs. Machine Learning Revisited and the Curse of Dimensionality in Side-Channel Analysis

Liran Lerman; Romain Poussier; Gianluca Bontempi; Olivier Markowitch; François-Xavier Standaert

Template attacks and machine learning are two popular approaches to profiled side-channel analysis. In this paper, we aim to contribute to the understanding of their respective strengths and weaknesses, with a particular focus on their curse of dimensionality. For this purpose, we take advantage of a well-controlled simulated experimental setting in order to put forward two important intuitions. First and from a theoretical point of view, the data complexity of template attacks is not sensitive to the dimension increase in side-channel traces given that their profiling is perfect. Second and from a practical point of view, concrete attacks are always affected by estimation and assumption errors during profiling. As these errors increase, machine learning gains interest compared to template attacks, especially when based on randomi¾?forests.


international workshop constructive side-channel analysis and secure design | 2013

Semi-Supervised template attack

Liran Lerman; Stephane Fernandes Medeiros; Nikita Veshchikov; Cédric Meuter; Gianluca Bontempi; Olivier Markowitch

Side channel attacks take advantage of information leakages in cryptographic devices. Template attacks form a family of side channel attacks which is reputed to be extremely effective. This kind of attacks assumes that the attacker fully controls a cryptographic device before attacking a similar one. In this paper, we propose to relax this assumption by generalizing the template attack using a method based on a semi-supervised learning strategy. The effectiveness of our proposal is confirmed by software simulations, by experiments on a 8-bit microcontroller and by a comparison to a template attack as well as to two supervised machine learning methods.


Journal of Cryptographic Engineering | 2015

A machine learning approach against a masked AES Reaching the limit of side-channel attacks with a learning model

Liran Lerman; Gianluca Bontempi; Olivier Markowitch

Side-channel attacks challenge the security of cryptographic devices. A widespread countermeasure against these attacks is the masking approach. Masking combines sensitive variables with secret random values to reduce its leakage. In 2012, Nassar et al. (DATE, pp 1173–1178. IEEE, 2012) presented a new lightweight (low-cost) boolean masking countermeasure to protect the implementation of the Advanced Encryption Standard (AES) block-cipher. This masking scheme represents the target algorithm of the DPAContest V4 (http://www.dpacontest.org/home/, 2013). In this paper, we present the first machine learning attack against a specific masking countermeasure (more precisely the low-entropy boolean masking countermeasure of Nassar et al.), using the dataset of the DPAContest V4. We succeeded to extract each targeted byte of the key of the masked AES with


Space | 2013

A time series approach for profiling attack

Liran Lerman; Gianluca Bontempi; Souhaib Ben Taieb; Olivier Markowitch


hardware oriented security and trust | 2016

Comparing Sboxes of ciphers from the perspective of side-channel attacks

Liran Lerman; Olivier Markowitch; Nikita Veshchikov

7.8


Journal of Cryptographic Engineering | 2015

The bias–variance decomposition in profiled attacks

Liran Lerman; Gianluca Bontempi; Olivier Markowitch


IEEE Transactions on Computers | 2018

Start Simple and then Refine: Bias-Variance Decomposition as a Diagnosis Tool for Leakage Profiling

Liran Lerman; Nikita Veshchikov; Olivier Markowitch; François-Xavier Standaert

7.8 traces during the attacking phase with a strategy based solely on machine learning models. Finally, we compared our proposal with (1) a stochastic attack, (2) a strategy based on template attack and (3) a multivariate regression attack. We show that an attack based on a machine learning model reduces significantly the number of traces required during the attacking step compared to these profiling attacks when analyzing the same leakage information.


international workshop constructive side-channel analysis and secure design | 2017

On the Construction of Side-Channel Attack Resilient S-boxes

Liran Lerman; Nikita Veshchikov; Stjepan Picek; Olivier Markowitch

The goal of a profiling attack is to challenge the security of a cryptographic device in the worst case scenario. Though template attack is reputed as the strongest power analysis attack, they effectiveness is strongly dependent on the validity of the Gaussian assumption. This led recently to the appearance of nonparametric approaches, often based on machine learning strategies. Though these approaches outperform template attack, they tend to neglect the potential source of information available in the temporal dependencies between power values. In this paper, we propose an original multi-class profiling attack that takes into account the temporal dependence of power traces. The experimental study shows that the time series analysis approach is competitive and often better than static classification alternatives.

Collaboration


Dive into the Liran Lerman's collaboration.

Top Co-Authors

Avatar

Olivier Markowitch

Université libre de Bruxelles

View shared research outputs
Top Co-Authors

Avatar

Gianluca Bontempi

Université libre de Bruxelles

View shared research outputs
Top Co-Authors

Avatar

Nikita Veshchikov

Université libre de Bruxelles

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

François-Xavier Standaert

Université catholique de Louvain

View shared research outputs
Top Co-Authors

Avatar

Stjepan Picek

Katholieke Universiteit Leuven

View shared research outputs
Top Co-Authors

Avatar

Jorge Nakahara

Université libre de Bruxelles

View shared research outputs
Top Co-Authors

Avatar

Romain Poussier

Université catholique de Louvain

View shared research outputs
Top Co-Authors

Avatar

François Gérard

Université libre de Bruxelles

View shared research outputs
Researchain Logo
Decentralizing Knowledge