Description
As Neural Networks become more popular and potent, they replace other Machine Learning techniques
for Side-Channel Attacks. However, it is not quite clear what Neural Networks are capable of.
This paper aims to look at what specific archtictures and layer configurations are most efficient
at extracting the leaked information from a collected trace. In addition, the performance of Neural
Networks at circumventing countermeasures will be evaluated.
|