Overview
Syllabus
Intro
Power analysis
Example (huge) leakage
Signal processing (demo)
AES-128 first round attack
Points of interest selection
Concept of Template Analysis
The actual process
Deep Learning
Convolutional Neural Networks (CNN)
Creating training/test/validation data sets
Classification
Step 1: Define initial hyper-parameters (demo)
Make sure it's capable of learning
Make it generalize
Key Recovery
Piñata AES-128 with misalignment (demo)
Bypassing Misalignment with CNNS
Breaking protected ECC on Piñata
Breaking AES with First-Order Masking (demo)
1st cool thing
2nd cool thing
I want to learn more!
Key takeaways
Taught by
Black Hat